Weak Passwords Caused Ascension’s Catastrophic Data Breach

▼ Summary
– A US senator urged the FTC to investigate Microsoft for cybersecurity negligence related to a ransomware attack on Ascension that affected 140 hospitals and 5.6 million patients.
– The breach began in February 2024 when a contractor downloaded malware via Microsoft’s Bing search engine, allowing attackers to access Ascension’s network.
– Attackers gained control of Ascension’s Windows Active Directory, which functioned like a master key for the entire network.
– Microsoft was criticized for supporting an outdated, insecure authentication protocol that defaulted to weak security, enabling the attackers to perform a Kerberoasting attack.
– Ascension’s own security failings, including a weak password that allowed the Kerberoasting attack to succeed, were overlooked in initial discussions of the breach.
A recent call for a Federal Trade Commission investigation into Microsoft’s cybersecurity practices has brought renewed attention to last year’s devastating ransomware attack against healthcare provider Ascension. While the focus has centered on Microsoft’s role, previously undisclosed details now point to significant security shortcomings within Ascension’s own systems, including the use of alarmingly weak passwords that enabled the breach.
Senator Ron Wyden of Oregon formally requested the FTC probe, citing findings from his office’s investigation. The breach reportedly began in February 2024 when a contractor inadvertently downloaded malware via a link from Microsoft’s Bing search engine. From that initial point of access, attackers swiftly moved to compromise Ascension’s Windows Active Directory, a critical network resource that functions as a digital master key for system-wide access and administrative controls.
Wyden criticized Microsoft for maintaining support for an outdated version of the Kerberos authentication protocol, which relies on a vulnerable encryption method. Although modern Active Directory systems default to more secure authentication, they can revert to the weaker standard if prompted by a compromised device. This vulnerability allowed the attackers to execute a Kerberoasting attack, a technique that exploits weak encryption to harvest and crack password data.
What remains notably absent from the public discussion, however, is a thorough examination of Ascension’s internal security measures. According to the technical details of the attack, a weak password played a central role in the breach’s success. Kerberoasting attacks depend entirely on the ability to crack passwords quickly, a task that becomes trivial when passwords lack complexity or strength. This raises serious questions about the password policies and enforcement practices Ascension had in place at the time of the incident.
The incident underscores a critical lesson for organizations of all sizes: technological vulnerabilities are only part of the problem. Human factors and procedural weaknesses, such as poor password hygiene, can create openings even when other defenses are technically sound. In this case, a combination of outdated protocols and weak authentication credentials led to the exposure of sensitive medical data belonging to millions of patients.
(Source: Ars Technica)


