Security News > 2021 > August > Windows 365 exposes Microsoft Azure credentials in plaintext
A security researcher has figured out a way to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new Windows 365 Cloud PC service using Mimikatz.
On August 2nd, Microsoft launched their Windows 365 cloud-based desktop service, allowing users to rent Cloud PCs and access them via remote desktop clients or a browser.
The credential dumps are being done through a vulnerability he discovered in May 2021 that allows him to dump the plaintext credentials for users logged into a Terminal Server.
"Because only the Terminal Server can ask for this kind of own decryption, I had to trick it to decrypt the credentials for me :),". BleepingComputer used a free Cloud PC trial on Windows 365 to test this technique.
You may be wondering what the big deal is if you need to be an Administrator to run mimikatz and you already know your Azure account credentials.
As Windows 365 is geared towards the enterprise, Microsoft will likely add these security features in the future, but for now, it is important to be aware of this technique.
News URL
Related news
- Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel (source)
- Windows Themes zero-day bug exposes users to NTLM credential theft (source)
- Microsoft fixes Windows 10 bug causing apps to stop working (source)
- Microsoft wants $30 if you want to delay Windows 11 switch (source)
- Microsoft delays Windows Recall again, now by December (source)
- Microsoft: Chinese hackers use Quad7 botnet to steal credentials (source)
- Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns (source)
- Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft (source)
- Microsoft warns Azure Virtual Desktop users of black screen issues (source)
- Week in review: Windows Themes spoofing bug “returns”, employees phished via Microsoft Teams (source)