North Korean Hackers Get Sneaky: The RIDiculously Clever Admin Trick
North Korean hackers, using RID hijacking, are turning low-privileged Windows accounts into admin-level ones. By altering the RID value, they trick Windows into granting elevated access. Though it requires initial SYSTEM access, this stealthy tactic bypasses many security measures, making it a formidable technique in the cyber-arsenal.

Hot Take:
Who knew the path to world domination started with a humble Windows low-privilege account? North Korean hackers are giving low-level accounts a glow-up by transforming them into admin-level superstars. It’s like the Cinderella story, but with malware and registry tweaks instead of glass slippers and fairy godmothers. Watch out, Disney!
Key Points:
- North Korean group Andariel is using RID hijacking to elevate low-privileged Windows accounts to admin status.
- RID hijacking involves modifying the Security Identifier (SID) to trick Windows into granting elevated access.
- Hackers achieve initial SYSTEM access by exploiting vulnerabilities and using tools like PsExec and JuicyPotato.
- Andariel covers tracks by manipulating registry settings and avoiding detection.
- Defense strategies include using LSA Subsystem Service and restricting the execution of certain tools.
Already a member? Log in here