/
랜섬웨어 격리

Beyond the Gate: Zero Trust and the Defense of Active Directory

When Marks & Spencer went dark last April, it wasn’t just another outage. The British retailer had shut down its online services to contain a ransomware attack aimed at its core identity backbone.

Researchers now link the incident to Scattered Spider, a loose-knit crew of U.K.- and U.S.-based attackers, some as young as 16. The group used DragonForce, a ransomware affiliate service that makes cybers attacks as easy as renting malware and extortion tools.

Adding insult to injury, DragonForce even emailed M&S CEO Stuart Machin directly, bragging about the breach and demanding payment.

What made this incident different wasn’t the motive, but the method — and the heightened danger it represents. Rather than spreading gradually across end-user systems, the attackers moved directly toward the domain controller, the system that governs identity and trust across the enterprise.

It marks a new phase in how ransomware groups work. Rather than spreading indiscriminately, attackers are increasingly zeroing in on identity systems to accelerate impact. Examining how that shift played out — and how it can be stopped — reveals why identity has become the new center of gravity in ransomware defense.

According to GROUP-IB analysts, DragonForce is a ransomware-as-a-service affiliate program that uses two ransomware variants and often customizes attacks to each victim for maximum impact.

When the heart of identity is unsecured

Investigators have confirmed that the M&S attackers exfiltrated the NTDS.dit file — the crown jewels of Microsoft Active Directory.  

Active Directory runs on domain controllers — the servers that store and enforce the entire identity system. In plain terms, they stole the domain controller database, the system that decides who inside a company is trusted, what they’re allowed to access, and how every other system verifies identity.  

The heist was the digital equivalent of walking out of a bank, not just with the vault’s contents but with the keys, the blueprints, and the authority to print new money at will.  

The attack xposed a reality that organizations may not want to admit publicly: attackers know that compromising a domain controller is the fastest and most reliable path to breaching an entire enterprise.

The M&S attack also shows how modern threat actors often think. Once they get inside a network, they don’t linger on end-user machines or look for stray servers to encrypt. They often laser-focus on finding a path to the domain controller.

This is because Active Directory is the system that holds everything together — user accounts, service accounts, permissions, authentication tickets, and the trust relationships that bind huge corporate environments. It’s a path that a Zero Trust approach would have shut down.

“If you control the domain controller, you control the identity infrastructure of the organization,” said Michael Adjei, director of systems engineering at Illumio. “You can give yourself what’s called god-like permissions to control over every system that trusts it.

That insight echoes warnings from CISA.

“If an attacker reaches the domain controller, they don’t just get access. They inherit the entire identity fabric of the organization,” Adjei said. “Accounts, permissions, tokens, service credentials: everything flows from Active Directory.”  

Windows Server 2012 Server Manager Dashboard showing three roles: AD directory server, DNS, and file services.

The Change Healthcare breach: a foothold no one stopped

Something similar happened in a Change Healthcare breach disclosed in February 2024, one of the largest healthcare cyber incidents in U.S. history.

Attackers, believed to be ALPHV Blackcat affiliates, gained an initial foothold through a remote server that lacked multi-factor authentication. Then they moved laterally through the environment, escalated privileges, and finally reached systems tied to the company’s core identity infrastructure.

The results were catastrophic: weeks of outages, billions in losses, nationwide pharmacy disruption, and data exposure affecting nearly 200 million people.

UnitedHealth Group CEO Andrew Witty paid the ransom, reportedly about $22 million in Bitcoin.  

But the payment didn’t bring the data back. Witty confirmed Change Healthcare recovered nothing — a familiar outcome in ransomware cases and a key reason experts warn against paying at all.  

The U.S. State Department is offering $15 million for intel that helps identify or track down the leaders behind ALPHV/BlackCat.

How the breach accelerates: path to the domain controller

The breach shows the real cost of an identity-layer failure combined with a lack of Zero Trust controls: one gap, a rapid lateral attack, and nationwide disruption that no ransom can reverse.

Once inside, threat actors don’t need to hit every system — they only need an east-west path of least resistance without controls.  

With nothing to contain the breach, they move laterally toward the domain controller, take hold of the victim’s core identity systems, and turn a single foothold into full-on compromise.

Adjei explained that most domain controller breaches start with something small, such as an unpatched system, a misconfigured identity control, or an old service account with too many privileges. Those gaps give attackers a quiet foothold and a chance to map the environment from the inside.

From there, the reconnaissance looks ordinary: group lookups, domain trust checks, Kerberos queries, and service enumeration. None of them may trigger alarms by itself. But together, these steps reveal the most important target in the network: the domain controller and the identities that can reach it.

“The danger is that many organizations assume their domain controller is safe because it sits behind monitoring or physical isolation,” Adjei said. “But attackers rarely go at it directly. They follow whatever internal path is open — a weak credential, a reachable system, or a flat east-west network that never blocks their movement.”  

The pattern in both M&S and Change Healthcare breaches makes the point clear: when attackers can reach Active Directory, escalation is inevitable.

“You need graph-based visibility, not just logs,” Adjei said. “You must understand relationships between entities — how account A talks to system B, which authenticates through the domain controller. That’s where dependency mapping becomes critical.”

Securing the identity core through segmentation

Domain controllers cannot sit on an open network. When everything can reach them, attackers can, too.  

Segmentation creates simple, strong Zero Trust boundaries around these systems. It blocks unnecessary east-west traffic and removes the easy paths attackers use to move deeper.

The first step is to see how everything connects. Map which systems talk to Active Directory and which accounts rely on it. With that view, you can limit access, so only the systems that truly need the domain controller can reach it.

A Zero Trust approach to segmentation should also work across every environment — cloud, data center, and endpoints. Without it, attackers could conceivably move through all of them.  

A segmented identity core stops a small breach from becoming a full compromise.

Improving detection and response for lateral movement

Most attacks become serious only after the first foothold.  

That’s why detection needs to look beyond the initial breach. Strong security starts with clear context: you must see how workloads, accounts, and the domain controller relate to each other.

Next, focus on lateral movement signals. These include strange connections between systems, unusual traffic patterns, or an identity reaching something it never touches. When detection highlights only the important events, teams can act faster with less noise.

The last step is fast containment. Detection and segmentation should work together to isolate a system the moment it behaves in a risky way. This stops an attacker from moving toward the identity core and reduces the blast radius of any breach.

Experience Illumio Insights free today to learn how to see and stop domain controller attacks before they spread.

관련 주제

관련 문서

사이버 인시던트에서 해야 할 일, 2부: 비기술적 대응
랜섬웨어 격리

사이버 인시던트에서 해야 할 일, 2부: 비기술적 대응

사이버 사고 대응의 중요한 비기술적 측면인 사고 평가, 보고, 규제 신고, 공개 공개 및 프로세스 시행을 이해합니다.

이름:WRECK 테이크아웃 - 마이크로 세분화가 가시성 및 억제에 도움이 되는 방법
랜섬웨어 격리

이름:WRECK 테이크아웃 - 마이크로 세분화가 가시성 및 억제에 도움이 되는 방법

마이크로 세분화가 가시성과 봉쇄를 통해 WRECK 취약성, 원격 코드 실행 또는 서비스 거부를 방지하는 데 어떻게 도움이 되는지 알아보세요.

블랙매터 랜섬웨어: 일루미오 제로 트러스트 세분화를 통한 위험 완화
랜섬웨어 격리

블랙매터 랜섬웨어: 일루미오 제로 트러스트 세분화를 통한 위험 완화

블랙매터 랜섬웨어에 대해 자세히 알아보고, 일루미오가 제로 트러스트 세분화를 통해 RaaS 그룹의 공격으로 인한 위험을 완화하는 방법을 알아보세요.

마스터 키 문제: 세일즈 로프트 내부의 침해와 지속적인 위협
랜섬웨어 격리

마스터 키 문제: 세일즈 로프트 내부의 침해와 지속적인 위협

Salesloft 침해 사고로 밝혀진 OAuth 토큰 남용, 숨겨진 신뢰 위험, 위협이 확산되기 전에 차단하는 방법에 대해 알아보세요.

현대의 트로이 목마: 공격자의 생활 방식과 이를 막는 방법
랜섬웨어 격리

현대의 트로이 목마: 공격자의 생활 방식과 이를 막는 방법

공격자들이 PowerShell 및 SSH와 같은 신뢰할 수 있는 도구를 사용하여 '어떻게' 공격하는지, 가시성 및 차단 기능을 통해 LOTL 위협을 차단하는 방법을 알아보세요.

여기 드래곤이 있습니다: 중요 인프라에 대한 사이버 위협의 증가 추세
사이버 복원력

여기 드래곤이 있습니다: 중요 인프라에 대한 사이버 위협의 증가 추세

글로벌 긴장이 고조되고 국가 지원 단체가 유틸리티, 의료 서비스 등을 표적으로 삼으면서 2025년에 중요 인프라에 대한 사이버 공격이 어떻게 증가할지 알아보세요.

위반 가정.
영향 최소화.
복원력 향상.

제로 트러스트 세분화에 대해 자세히 알아볼 준비가 되셨나요?