
Ransomware attacks against federal agencies are on the rise, and most breaches involve the identity system (Active Directory and Entra ID). Protecting federal agencies from cyberattacks requires specialized tools and expertise to uncover vulnerabilities, monitor and remediate malicious changes, and recover the identity system to a trusted environment.
Identity-related cyberattacks are prevalent in federal agencies. CISA’s FY2023 Risk and Vulnerability Assessment work (including assessments across the Federal Civilian Executive Branch) highlights credential access as a prevalent and successful method used by threat actors to compromise networks—aligning with the rising share of credential-driven vectors seen in FISMA reporting.
Semperis has a strong track record of protecting millions of identities for numerous state, local, and education organizations, including the largest U.S. city, 5 of the largest U.S. states, court systems, transportation systems, emergency communications systems, and more.
As the National Security Agency (NSA) warned in its Detecting & Mitigating Active Directory Compromise report, gaining control over AD gives malicious actors privileged access to all systems and users managed by AD.
““Like numerous other networks, Active Directory is used in many Department of Defense and Defense Industrial Base networks as a critical component for managing identities and access,” said Dave Luber, NSA Cybersecurity Director. “This makes it an attractive target for malicious actors to attempt to steal the proverbial ‘keys to the kingdom.’ ”
Federal agencies face several challenges in effectively protecting hybrid AD/Entra ID systems from cyberattacks.

The National Security Agency (NSA) joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC) and other global government entities in releasing the Cybersecurity Technical Report (CTR) “Detecting and Mitigating Active Directory Compromises.” The guidance provides prevention and detection strategies for the most prevalent techniques used to target Active Directory (AD).
Read the ReportLearn more about how cybercriminals exploit identity systems across public sector and government organizations.