One of the most concerning attack methods I’ve come across recently is ‘Pass-the-PRT.’ It’s not the most likely of cyberattacks, but if successful – your organization’s security is in trouble. And that’s precisely what makes it dangerous—it leverages legitimate authentication processes, blending into normal network activity, making it hard to detect. I saw this firsthand while testing an Azure environment for lateral movement vulnerabilities. An attacker had been moving across systems for days using a stolen primary refresh token (PRT). Because they didn’t need to reauthenticate, their access looked legitimate, slipping past detection. It was a reminder of how easy…
Information Security Buzz is an independent resource that provides the experts’ comments, analysis, and opinion on the latest Cybersecurity news and topics