Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
Microsoft has disclosed a new vulnerability impacting Active Directory Certificate Services (ADCS) tracked as CVE-2022-26923 (Active Directory Domain Services Elevation of Privilege Vulnerability). If exploited successfully, an authenticated attacker can escalate privileges in environments where ADCS is running on the domain. eSentire is aware of technical details and tooling  for exploiting this vulnerability, increasing the risk this will be exploited in the wild. Impacted organizations are encouraged to prioritize testing and deployment of patches for CVE-2022-26923.
*For eSentire customers, please reach out to your CSM for a non-gated version of the TRU Intelligence Brief recording from May 2022
On May 10th, 2022, Microsoft disclosed CVE-2022-26923  (Active Directory Domain Services Elevation of Privilege Vulnerability). This vulnerability would allow a low-privileged user to escalate privileges to domain administrator when Active Directory Certificate Services is running on the domain.
Following Microsoft’s disclosure, the researcher who identified CVE-2022-26923 released technical details and updated tooling to exploit the vulnerability . In essence, a low-privileged user could manipulate the dnsHostName property for their system and impersonate the machine name of a domain controller and request a certificate. This certificate can then be used for additional attacks, such as DCSync.
According to Microsoft “Before the May 10, 2022 security update, certificate-based authentication would not account for a dollar sign ($) at the end of a machine name. This allowed related certificates to be emulated (spoofed) in various ways.” 
We recommend reviewing Microsoft’s supplementary patch documentation on this issue for more information. We are also aware of post-patch issues  and recommend testing in your environment prior to patching.