{"id":38783,"date":"2020-12-18T17:06:41","date_gmt":"2020-12-18T17:06:41","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31861\/NSA-Warns-Of-Federated-Login-Abuse-For-Local-To-Cloud-Attacks.html"},"modified":"2020-12-18T17:06:41","modified_gmt":"2020-12-18T17:06:41","slug":"nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/","title":{"rendered":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/12\/18\/aa814974-0601-47fc-8aa1-cc8b15e38ba7\/nsa-headquarters.jpg\" class alt=\"NSA headquarters\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"><a href=\"https:\/\/www.flickr.com\/photos\/30478819@N08\/26741384746\/in\/photolist-GK3A2G-oA4Lr1-oiBzsa-oA4Lzs-iMxfnp-7R3MPF-iMz6Yq-7R42UV-bL3f8k-iMBj2G-iMz9Fu-fKMSh5-nhDozC-iMyTzh-BSjeTi-iMx9j2-iMwW7B-fKMSwb-iMyS9G-nVNmEP-iMwUwT-iMwXx2-fKveuB-iMARLq-fKMRoq-XDwBPA-kSTL5y-H4Kqu4-fKvgcK-AcoG9S-fKveMR-a6yKsc-kSTNkL-8oWsAc-fME8q9-6NsCcZ-wZ63mp-iN38J6-ULuCUS-iN4pXp-GCsrpE-6XsMZm-bjWM1a-UCAaz2-nSHE5k-nQSgvN-UCAbdg-ncsY4f-ULuDUN-TAx86H\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">Image via Marco Verch (Flickr\/CC 2.0)<\/a><\/span><\/figcaption><\/figure>\n<p>The US National Security Agency has published a security advisory on Thursday warning about two techniques hackers are using to escalate access from compromised local networks into cloud-based infrastructure. <\/p>\n<p>The advisory comes on the heels of the massive&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-fireeye-confirm-solarwinds-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">SolarWinds supply chain hack<\/a>&nbsp;that has hit several US government agencies, security firm FireEye, and most recently,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-says-it-identified-40-victims-of-the-solarwinds-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>. <\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn-services-2020-nordvpn-purevpn-others-with-free-vpn-tiers\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best VPNs<\/strong><\/a> <\/p>\n<p>While the NSA doesn&#8217;t specifically mention the SolarWinds hack in its advisory, both techniques described in the document have also been spotted being abused by the SolarWinds hackers to escalate access to cloud resources after initially gaining access to local networks via the trojanized SolarWinds Orion app \u2014 as per advisories from&nbsp;<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FireEye<\/a>,&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/13\/customer-guidance-on-recent-nation-state-cyber-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Microsoft<\/a>, and&nbsp;<a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CISA<\/a>&nbsp;(the US Cybersecurity and Infrastructure Security Agency). <\/p>\n<p>As not to distort the NSA&#8217;s message, we&#8217;ll quote details about the two techniques directly from the agency&#8217;s advisory: <\/p>\n<hr>\n<p><em>&#8220;In the first [technique], the actors compromise on-premises components of a federated SSO infrastructure and steal the credential or private key that is used to sign Security Assertion Markup Language (SAML) tokens. Using the private keys, the actors then forge trusted authentication tokens to access cloud resources. [&#8230;]<\/em> <\/p>\n<p><em>In a variation of the first TTP, if the malicious cyber actors are unable to obtain a non-premises signing key, they would attempt to gain sufficient administrative privileges within the cloud tenant to add a malicious certificate trust relationship for forging SAML tokens.<\/em> <\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p><em>In the second TTP, the actors leverage a compromised global administrator account to assign credentials to cloud application service principals (identities for cloud applications that allow the applications to be invoked to access other cloud resources). The actors then invoke the application&#8217;s credentials for automated access to cloud resources (often email in particular) that would otherwise be difficult for the actors to access or would more easily be noticed as suspicious.&#8221;<\/em> <\/p>\n<hr>\n<p>The NSA notes that neither technique is new and that both have been used since at least 2017, by both nation-state groups but also by other types of threat actors. <\/p>\n<p>Furthermore, the NSA adds that neither of the two techniques exploits vulnerabilities in federated authentication products, but they rather abuse legitimate functions after a local network or admin account compromise. <\/p>\n<p>The US security agency says that there are countermeasures that companies can put in place to at least detect when an intruder abuses these mechanisms and respond to breach faster. <\/p>\n<p>These mitigations, grouped across several categories, are detailed in the NSA advisory, available for download as a&nbsp;<a href=\"https:\/\/media.defense.gov\/2020\/Dec\/17\/2002554125\/-1\/-1\/0\/AUTHENTICATION_MECHANISMS_CSA_U_OO_198854_20.PDF\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PDF document<\/a>. <\/p>\n<p>The NSA also said that even if the advisory and mitigations are centered around Microsoft Azure, &#8220;many of the techniques can be generalized to other environments as well.&#8221; <\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/\" class=\"lazy\" alt=\"nsa-saml-advisory.jpg\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/12\/18\/6eadb82e-2bde-4d0e-812c-4cbfc1d0fee3\/nsa-saml-advisory.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/12\/18\/6eadb82e-2bde-4d0e-812c-4cbfc1d0fee3\/nsa-saml-advisory.jpg\" class alt=\"nsa-saml-advisory.jpg\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: NSA <\/span><\/figcaption><\/figure>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">SolarWinds Coverage<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31861\/NSA-Warns-Of-Federated-Login-Abuse-For-Local-To-Cloud-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38784,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9108],"class_list":["post-38783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackergovernmentusapasswordnsa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-18T17:06:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks\",\"datePublished\":\"2020-12-18T17:06:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/\"},\"wordCount\":473,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg\",\"keywords\":[\"headline,hacker,government,usa,password,nsa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/\",\"name\":\"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg\",\"datePublished\":\"2020-12-18T17:06:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,password,nsa\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusapasswordnsa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/","og_locale":"en_US","og_type":"article","og_title":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-18T17:06:41+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks","datePublished":"2020-12-18T17:06:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/"},"wordCount":473,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg","keywords":["headline,hacker,government,usa,password,nsa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/","name":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg","datePublished":"2020-12-18T17:06:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsa-warns-of-federated-login-abuse-for-local-to-cloud-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,password,nsa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusapasswordnsa\/"},{"@type":"ListItem","position":3,"name":"NSA Warns Of Federated Login Abuse For Local-To-Cloud Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38783"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38783\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38784"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}