Semperis, a leader in AI-driven identity security and cyber resilience, has unveiled significant research surrounding a newly identified vulnerability in Windows Server 2025. This flaw, known as Golden dMSA, poses a serious risk by enabling high-impact attacks that facilitate cross-domain lateral movement and grant persistent access to managed service accounts across Active Directory.
Introducing GoldenDMSA
In an effort to deepen the understanding of this emerging threat, Semperis Researcher Adi Malyanker has developed a sophisticated tool named GoldenDMSA. This innovative instrument encapsulates the attack’s logic, allowing cybersecurity professionals to explore, evaluate, and simulate potential exploitation scenarios in real-world environments.
The Golden dMSA attack exploits a cryptographic vulnerability that undermines Microsoft’s latest security enhancements in Windows Server 2025. At its core, the attack takes advantage of a critical design flaw within the ManagedPasswordId structure, which contains predictable time-based components and only offers 1,024 possible combinations. This limitation renders brute-force password generation alarmingly simple.
Malyanker emphasizes the implications of this vulnerability: “Golden dMSA exposes a critical design flaw that could let attackers generate service account passwords and persist undetected in Active Directory environments,” he stated. He further noted that the GoldenDMSA tool is designed to empower defenders and researchers to grasp the mechanics of this attack, urging organizations to proactively assess their systems to mitigate the risks associated with this emerging threat.
In addition to the Golden dMSA research, Semperis has been at the forefront of identity threat detection, recently revealing insights into nOauth, a vulnerability within Microsoft’s Entra ID that allows for full account takeovers in susceptible SaaS applications with minimal effort from attackers. Furthermore, the company has enhanced its Directory Services Protector platform to counteract BadSuccessor, a severe privilege escalation technique linked to a new feature in Windows Server 2025. Last year, Semperis researchers also identified Silver SAML, a variant of the SolarWinds-era Golden SAML technique that circumvents standard defenses in Entra ID-integrated applications.
Semperis remains committed to safeguarding critical enterprise identity services for security teams tasked with defending hybrid and multi-cloud environments. Its purpose-built solutions secure hybrid identity frameworks, including Active Directory, Entra ID, and Okta, protecting over 100 million identities from cyber threats, data breaches, and operational errors. As part of its mission to contribute positively to the cybersecurity landscape, Semperis provides various community resources, including the acclaimed Hybrid Identity Protection (HIP) Conference, the HIP Podcast, and free identity security tools such as Purple Knight and Forest Druid.
Headquartered in Hoboken, New Jersey, Semperis is a privately owned international company that supports some of the world’s largest brands and government agencies, with a customer base spanning over 40 countries.
For more information, visit the Semperis blog or follow them on LinkedIn, X, Facebook, and YouTube.
Media Contact:
Bill Keeler
Senior Director, PR & Comms
Semperis
[email protected]