Ymir Vigfusson
April 10, 2025
For a while, Privileged Access Management (PAM) was the shining white knight of cybersecurity—the protector of sensitive systems separating privileged accounts from regular accounts, PAM would contain the damage caused by stolen credentials, ensuring that access was limited and temporary. In theory, it was the perfect hero for the job.
But developing cybersecurity is like building on quicksand: the arms race between hackers and defenders is relentless and underlying assumptions are rapidly undermined. Today’s hackers are not merely breaking down doors but also slipping through the cracks. Invisible attack methods abound, such as "living off the land" (LOTL) tactics, stealthily exploring trusted environments and remaining dormant until privileged access is granted. Advanced Persistent Threats (APT) are now actively waiting for their opportunity to launch into action.
At that moment, the attackers strike, hijacking legitimate sessions and rendering PAM’s shining armor into little more than a flimsy shield. The hero has been categorically dethroned by the adversary's technological advances.
Privileged Access Management is a security strategy that enforces strict controls over elevated access to critical systems. Its primary focus is to mitigate the risks associated with compromised credentials, especially those of administrators with high access levels, by using those privileges sparingly, narrowly, and observantly
The following are some central features offered by today’s PAM security suites:
PAM was developed to extend the principle of least privilege — the idea that a person should only have access to the resources necessary for their roles. By enforcing strict controls over privileged accounts, PAM seeks to limit the attack surface available to cybercriminals.
Before PAM, administrators often had persistent, high-level access to sensitive systems. This ticking time bomb created significant risks when the admin’s credentials were compromised. In this narrative, PAM adds an extra layer of protection and security by reducing the time windows in which administrative access tokens are valid. This forces attackers to both hijack authentication tokens and use them at the right time.
The workflow of using PAM in your infrastructure typically involves three key concepts.
On the positive side, this structured approach is helpful in mitigating risks from stolen credentials. If an attacker compromises a standard employee account, they would still need to navigate PAM’s access request processes to escalate their privileges—something that’s not easily done without detection. Furthermore, when a privileged account becomes compromised, PAM’s tight time windows force the attack to unfold at the exact right time.
On the flip side, while PAM helps address traditional credential-based threats, it still struggles against modern tactics like “living off the land” (LOTL) attacks. This attack methodology, used by ransomware groups and advanced state actors (APT), exploits legitimate tools and sessions within an environment, blending into normal operations to avoid detection.
LOTL attacks love to use built-in administrative tools, scripts, and processes to perform malicious activities.
LOTL attackers exploit the assumption that all actions performed within an authorized privileged session are legitimate. Since PAM doesn’t verify the source of commands during active sessions, these blind spots leave organizations vulnerable. Alarmingly, these attacks are easy to carry out for the attacker if they are patient enough to wait for a privileged session to be established.
To understand how "living off the land" (LOTL) attacks exploit the limitations of Privileged Access Management (PAM), consider the following scenario broken into sequential steps:
Step 1: Establishing initial foothold
The attacker gains an initial foothold by compromising the administrator’s workstation, often through social engineering, phishing, illicit purchase of access tokens, or by exploiting system vulnerabilities. It’s jaw-droppingly easy to find “Initial Access Brokers” to purchase active tokens from on the dark web if you know where to find them.
Step 2: Living off the land As post exploitation actors take over, they remain inactive to evade detection, blending in with legitimate processes or simply observing and waiting for a privileged session to begin.
Step 3: Authenticating as an administrator
The administrator logs into the PAM-protected system and authenticates using credentials and multi-factor authentication (MFA). The OTP proves the request is legitimate, and it is actually legitimate, thus PAM grants the access and elevated privileges.
Step 4: Granting privileged access
The administrator receives temporary elevated privileges for a specific task. PAM establishes the session, considering it is authenticated, legitimate and secure. At this point, believing its job is finished, PAM gets out of the way and allows the admin to interact freely with the server it was protecting.
Step 5: Hijacking the session
The privileged session triggers the attack to activate. The attack process either hijacks the ongoing session by setting up a proxy, or injects malicious commands directly into the process responsible for the established session. PAM, unable to differentiate these malicious commands from legitimate admin actions, allows them all and the rogue commands are invisible to the authorized person who is using the session concurrently.
Step 6: Gaining privileged access
Using the compromised session, the attacker now moves through the network covertly impersonating the authorized admin, accessing systems, establishing further control, backdooring systems, exfiltrating data, or deploying ransomware.
PAM was designed to protect admin accounts in the era of password and token compromise. By limiting privileges only to the tasks in which they are necessary, PAM is effective at reducing the window in which the attack can occur down to only while the authorized administrator is working. However, attackers have evolved and PAM cannot reliably establish a root of trust when workstations are compromised.
Since deploying ransomware can be deployed in just a few minutes, triggering attacks based on when new administrative sessions are established efficiently bypasses PAM. The assumption that all actions within an authenticated session are legitimate renders PAM ineffective in denying access to APT leveraging LOTL techniques. This vulnerability shows the need for enhanced security measures beyond traditional credential-based controls.
Elite attackers play the long game and their patience cannot be underestimated. They are more inclined to wait for the right moment than to try to force an action which will likely trigger detection.
When PAM’s blind spots are exploited, the consequences can be devastating:
These risks underscore the pressing need for additional security measures beyond traditional PAM implementations.
PAM relies on credentials, and usually MFA, to establish its trust in an account’s identity. However, this credential-centric model has significant limitations:
The results are an open window for attackers. Once access is granted, attackers can act without interference until the session ends because it is acting as the authorized person now.
While MFA and continuous authentication are often used to strengthen security, they do not address the core issue: verifying the legitimacy and intent of each command during an active session.
Privileged Access Management was built to guard the gates, but in today’s threat landscape, the moats no longer protect the windows so we have to protect them too. Modern attackers don’t smash through walls—they slip inside, waiting for the moment privileged access is granted. Once in, APT becomes indistinguishable from your administrators. PAM doesn’t see the difference, and that’s the problem.
This isn’t just a vulnerability—it’s an invitation. Attackers thrive on assumptions: that credentials mean control and that sessions mean safety. But assumptions don’t protect networks; vigilance does. It’s not enough to lock the front door when you can’t tell your spouse from an intruder..
The challenge is clear: we need more than credential trust. We need proof based on a reliable root of trust. Every action, every command, must be verified in real-time. Because in cybersecurity, trust isn’t enough—certainty is.
Try Keystrike in Your Environment for 30 Days