Yuval Gordon Profile
Yuval Gordon

@YuG0rd

Followers
1K
Following
456
Media
3
Statuses
80

Security Researcher at Akamai. Opinions are my own.

Joined December 2017
Don't wanna be here? Send us removal request.
@YuG0rd
Yuval Gordon
3 months
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability.It allows compromising any user in AD, it works with the default config, and. Microsoft currently won't fix it 🤷‍♂️.Read Here -
Tweet media one
22
373
867
@YuG0rd
Yuval Gordon
2 months
RT @cybersaiyanIT: Another Monday. Another week of… endless emails, annoying meetings, and oh look, a three-headed monkey behind you!. Now….
0
9
0
@YuG0rd
Yuval Gordon
2 months
RT @akamai_research: If you can't beat them, ban them 😏 . Malicious Cryptominers can be tough to dismantle - but we found a way. 👀 By explo….
0
7
0
@YuG0rd
Yuval Gordon
2 months
RT @yo_yo_yo_jbo: פיד ישראל: מקומות שניתן לתרום להם בדולרים ויש להם חשבון ב benevity?.🇮🇱 אשמח אם תעזרו לי להפיץ את ההודעה.
0
4
0
@YuG0rd
Yuval Gordon
3 months
Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.
9
154
499
@YuG0rd
Yuval Gordon
3 months
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
github.com
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai. - logangoins/SharpSuccessor
0
170
0
@YuG0rd
Yuval Gordon
3 months
RT @jaredcatkinson: We did an analysis across participating customers & found that ~96% had > 1 user that has the necessary permissions to….
0
8
0
@YuG0rd
Yuval Gordon
3 months
Given all of this, we believed it was in the best interest of defenders to share our findings openly and proactively.
0
0
21
@YuG0rd
Yuval Gordon
3 months
Finally, we had little confidence that Microsoft would move quickly. The vulnerability was rated as “moderate” and we were given no timeline for a fix. That led us to believe a patch might not arrive for several months — if at all.
1
0
13
@YuG0rd
Yuval Gordon
3 months
We were genuinely shocked by how easy this was to discover, and surprised no one else had already reported it. Since it hinges on newly introduced and currently unmonitored attributes, it’s entirely plausible that adversaries could have found and used it quietly.
1
0
11
@YuG0rd
Yuval Gordon
3 months
Based on our data:.91% of organizations we examined had some low-privileged users who could exploit this issue — a meaningful risk. But fewer than 10% had any domain controllers running Windows Server 2025.
1
0
8
@YuG0rd
Yuval Gordon
3 months
To exploit it, an attacker would first need access to a domain account with specific privileges. In other words, it’s a privilege escalation path with certain prerequisites - not an unauthenticated RCE.
1
0
14
@YuG0rd
Yuval Gordon
3 months
Second, it’s important to clarify what this vulnerability actually enables. It does *not* allow an end-to-end domain takeover on its own.
1
0
10
@YuG0rd
Yuval Gordon
3 months
First, Windows Server 2025 is still in early stages of adoption. Based on what we’ve seen, most organizations haven’t yet upgraded their domain controllers. That window presented a critical opportunity to raise awareness before widespread deployment.
1
0
13
@YuG0rd
Yuval Gordon
3 months
Disclosing vulnerabilities always involves a careful tradeoff - there's potential for harm, but also for real benefit. In this case, we strongly believe that publishing this research creates a net positive impact for the security community.
1
0
10
@YuG0rd
Yuval Gordon
3 months
We've heard feedback suggesting we should have waited to release details about BadSuccessor until Microsoft issued a patch. We want to explain why we made the decision to go public immediately.
3
12
79
@YuG0rd
Yuval Gordon
3 months
RT @akamai_research: Today we unveil BadSuccessor - a new no-fix Active Directory privilege escalation technique. We will explore the rece….
0
182
0
@YuG0rd
Yuval Gordon
3 months
7/ Microsoft confirmed the issue, but said it doesn't meet the bar for immediate servicing. So for now: it's live, it's silent, and it's dangerous.
2
1
18
@YuG0rd
Yuval Gordon
3 months
6/ We named this attack BadSuccessor, because that's exactly what the dMSA becomes - the unintended heir to a high-privilege identity. A successor, with all the right keys.
2
1
12