Case Study

When Backup Systems Became the Attack Vector

> root@backup-mgmt:~# veeamconfig backup list --all | grep 'DC01' && echo 'full AD backup available'<span class="cursor-blink">_</span>_

Peter Bassill 7 January 2025 16 min read
penetration-testing backup-security data-protection from-the-hacker-desk firmware-vulnerabilities credential-exposure ransomware-resilience active-directory

The most trusted system on the network held a copy of everything.

There is a particular irony in compromising an organisation through its backup infrastructure. Backups exist to protect data — to ensure that when something goes wrong, the organisation can recover. They are the safety net, the last line of defence, the system that exists precisely for the worst-case scenario. They are also, by definition, a centralised repository containing a copy of everything the organisation considers important enough to protect.

Every file server. Every database. Every domain controller. Every application. Compressed, catalogued, and stored in one place — often on infrastructure that receives less security attention than the systems it is backing up.

On this engagement, we accessed the backup infrastructure through an exposed management interface with outdated firmware, extracted credentials from the backup catalogue, and used those credentials to restore and access full system images — including a complete Active Directory backup from which we recovered every domain credential. The backup system was not the target. It was the shortcut to everything.


The Engagement Brief

The client was a manufacturing company with approximately eight hundred employees across a headquarters site and two production facilities. Their IT infrastructure was substantial — a virtualised on-premises environment running several hundred servers, supported by a dedicated backup infrastructure comprising a commercial backup application, a purpose-built backup appliance, and a tape library for offsite archival.

We had been engaged for an internal penetration test with a broad scope covering all internal VLANs. The client had recently invested in a ransomware resilience programme following industry guidance, and their backup infrastructure had been upgraded eighteen months prior as part of that programme. They were confident that their backup systems were properly isolated and secured.

The backup systems were on a dedicated VLAN. The backup VLAN was documented as isolated from the user network. We were given a starting position on the user VLAN.

The isolation was not as complete as the documentation suggested.


Finding the Backup Infrastructure

During our initial reconnaissance of the user VLAN at 10.10.2.0/24, we performed DNS enumeration against the internal domain — querying for common hostnames associated with backup infrastructure. This is a standard step in our methodology; backup servers frequently have predictable naming conventions.

DNS Enumeration — Backup Infrastructure Discovery
$ dig +short backup.corp.local @10.10.1.10
10.10.8.10

$ dig +short veeam.corp.local @10.10.1.10
10.10.8.11

$ dig +short backup-appliance.corp.local @10.10.1.10
10.10.8.20

# Backup VLAN: 10.10.8.0/24
# Testing reachability from user VLAN:

$ nmap -Pn -p 80,443,9392,9393,22,3389 10.10.8.10-20

10.10.8.10 (backup) 443/tcp open 9392/tcp open
10.10.8.11 (veeam) 443/tcp open 9393/tcp open 3389/tcp open
10.10.8.20 (backup-appliance) 443/tcp open 22/tcp open 80/tcp open

# Backup VLAN is reachable from user VLAN on management ports

The backup VLAN was reachable from the user VLAN. The firewall rules permitted access to the backup servers' management interfaces — HTTPS, the Veeam console port, RDP, and SSH. The documentation stated that the backup VLAN was isolated from user networks, but the firewall rules told a different story.

Investigation later revealed the reason: when the backup infrastructure was upgraded eighteen months prior, the installation engineers had requested temporary firewall rules to manage the deployment from their workstations on the user VLAN. The rules were created as 'temporary' but were never removed. This pattern — temporary rules becoming permanent — appeared in our tenth article in this series. It remains the most common cause of segmentation failure we encounter.

Three devices were identified on the backup VLAN: a backup server running the backup application's management console, a Veeam Backup & Replication server, and a purpose-built backup appliance — a hardware device from a specialist vendor that provided deduplicated storage and replication capabilities.


The Backup Appliance

We focused first on the backup appliance at 10.10.8.20. Purpose-built backup appliances are hardware devices — typically rack-mounted servers with custom firmware — sold by specialist vendors as turnkey solutions for data protection. They provide a web-based management interface, deduplicated storage, replication to secondary sites, and integration with backup software such as Veeam, Commvault, or Veritas.

These appliances are frequently treated as 'set and forget' infrastructure. They are deployed by the vendor's professional services team, configured during installation, and then left to run. Firmware updates are deferred because they require maintenance windows and carry the risk of disrupting backup operations. Management interfaces are secured with the credentials set during installation and rarely changed.

The appliance's web management interface was accessible on port 443. The login page displayed the vendor's branding and the firmware version.

Backup Appliance — Management Interface
Appliance: [REDACTED] Data Protection Appliance
Firmware: v4.2.1 (released 2022-09-15)
Current: v6.1.0 (released 2024-11-20)
Delta: 7 major releases behind — 2 years without update

Default credentials tested:
admin / [vendor-default] ✗ Changed
maintenance / [vendor-default] ✓ ACCESS — maintenance account active

# Primary admin password changed. Maintenance account password unchanged.
# Maintenance account has full administrative access to appliance.

The firmware was seven major releases behind the current version — over two years without an update. The primary admin password had been changed during installation, but the appliance shipped with a second administrative account: a maintenance account intended for vendor support access. The maintenance account's default password had not been changed. It had full administrative access to the appliance.

The existence of secondary administrative accounts on appliances is a recurring theme across our engagements. Vendors include them for support and troubleshooting purposes. They are documented in installation guides but are rarely mentioned during handover to the customer's operations team. They persist with default credentials because nobody knows they exist.

Finding — Default Maintenance Credentials on Backup Appliance

The backup appliance's maintenance account retained the vendor's default password, providing full administrative access to the appliance and all stored backup data. The appliance firmware was seven major versions behind the current release, missing over two years of security patches.


What the Appliance Contained

With administrative access to the backup appliance, we examined its storage catalogue. The appliance was the primary backup target for the organisation's Veeam Backup & Replication infrastructure. Every backup job in the environment wrote its data to this device.

Backup Catalogue — Stored Backup Sets
Backup Repository — Storage Catalogue

Job Name Type Last Run Size
───────────────────────── ────────────── ───────────── ────────
DC-Daily Full + Incr 2025-01-06 420 GB
FileServers-Daily Full + Incr 2025-01-06 2.8 TB
SQL-Production Full + Incr 2025-01-06 1.2 TB
Exchange-Daily Full + Incr 2025-01-06 890 GB
ERP-System Full + Incr 2025-01-06 3.1 TB
Web-Servers Full + Incr 2025-01-06 180 GB
SCADA-Historian Full + Incr 2025-01-05 640 GB
Veeam-Config-Backup Config 2025-01-06 12 GB

Total deduplicated storage: 4.8 TB (raw: ~9.2 TB)
Retention: 30 days on-appliance, 90 days on tape

# Complete backups of domain controllers, file servers, SQL,
# Exchange, ERP, web servers, and SCADA historian

The appliance contained the organisation's complete backup catalogue — domain controllers, file servers, SQL production databases, Exchange mail, the ERP system, web servers, and the SCADA historian from their manufacturing environment. Every critical system in the organisation had a full backup stored on this single device.

The backup of particular interest was the Veeam-Config-Backup — Veeam's own configuration backup, which contains the Veeam server's settings, job definitions, and — critically — the encrypted credentials that Veeam uses to authenticate to the systems it backs up.


Veeam Configuration — The Credential Vault

We turned our attention to the Veeam Backup & Replication server at 10.10.8.11. The Veeam console was accessible on port 9393 via HTTPS. The server was running Veeam Backup & Replication v11 — a version that had reached end of support, superseded by v12. More importantly, v11 contained a known vulnerability: CVE-2023-27532, a high-severity flaw that allowed unauthenticated access to the Veeam configuration database, including the encrypted credentials stored within it.

This vulnerability had been publicly disclosed in March 2023 and patched in Veeam v11a (P20230227). The client's Veeam server had not been patched.

CVE-2023-27532 — Veeam Credential Extraction
# Veeam B&R v11 — CVE-2023-27532 — unauthenticated cred access

$ python3 veeam_cred_extract.py --target 10.10.8.11 --port 9401

[*] Connecting to Veeam service on 10.10.8.11:9401
[*] CVE-2023-27532 — requesting credential store...
[+] Credentials retrieved successfully

Account Type Password
───────────────────────────── ────────── ────────────────
CORP\svc_veeam_backup Domain [DECRYPTED]
CORP\svc_veeam_sql Domain [DECRYPTED]
CORP\svc_veeam_proxy Domain [DECRYPTED]
root (linux-web-01) Local SSH [DECRYPTED]
root (linux-web-02) Local SSH [DECRYPTED]
sa (sql-prod-01) SQL Auth [DECRYPTED]
administrator (appliance) Appliance [DECRYPTED]

Total: 7 credential sets recovered

Seven credential sets recovered — without authenticating to the Veeam server. The vulnerability allowed unauthenticated access to the encrypted credentials, and the decryption was performed using information available through the same API. The credentials included three domain service accounts, root SSH credentials for Linux web servers, the SQL Server SA account for the production database, and the administrator password for the backup appliance itself.

The svc_veeam_backup account was of immediate interest. Veeam requires a service account with elevated privileges to perform backup operations — it needs to read all data on the systems it protects. We enumerated the account's domain permissions.

svc_veeam_backup — Privilege Enumeration
$ ldapsearch -x -H ldap://10.10.1.10 \
-D 'svc_veeam_backup@corp.local' -w '[DECRYPTED]' \
-b 'DC=corp,DC=local' '(sAMAccountName=svc_veeam_backup)' memberOf

memberOf: CN=Domain Users,CN=Users,DC=corp,DC=local
memberOf: CN=Backup Operators,CN=Builtin,DC=corp,DC=local
memberOf: CN=Domain Admins,CN=Users,DC=corp,DC=local

# svc_veeam_backup is a DOMAIN ADMIN

The Veeam backup service account was a Domain Admin. This is a configuration that Veeam's own documentation explicitly advises against — Veeam does not require Domain Admin privileges and provides guidance on configuring a service account with minimum necessary permissions. However, granting Domain Admin to the backup service account is the path of least resistance during installation, and it is depressingly common.

We now had Domain Admin credentials — extracted from a backup server, via a vulnerability that had been patched nearly two years earlier, on infrastructure that was supposed to be isolated from the user network.


The Domain Controller Backup

The Domain Admin credentials alone were sufficient for full domain compromise. However, to demonstrate the additional risk posed by the backup data itself, we examined the domain controller backup stored on the appliance.

The DC-Daily backup contained full system images of both domain controllers. A domain controller backup includes the NTDS.dit file — the Active Directory database containing every user account, every password hash, every group membership, and every trust relationship in the domain. An attacker with access to an NTDS.dit file and the corresponding SYSTEM registry hive can extract every credential in the domain offline, without generating a single authentication event on the live domain controllers.

This is the critical distinction between attacking the backup and attacking the live system. A DCSync attack against a live domain controller generates Event ID 4662 — detectable by a properly configured SIEM. Extracting credentials from a backup generates no events whatsoever, because the backup is a static file on a storage device. The extraction is invisible.

Offline Credential Extraction — From Backup
# Mount DC01 backup image from appliance repository:
# (Using Veeam console with svc_veeam_backup credentials)

# Extract NTDS.dit and SYSTEM hive from mounted image:
$ cp /mnt/dc01-restore/Windows/NTDS/ntds.dit /tmp/
$ cp /mnt/dc01-restore/Windows/System32/config/SYSTEM /tmp/

$ impacket-secretsdump -ntds /tmp/ntds.dit -system /tmp/SYSTEM LOCAL

[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404ee:[REDACTED]:::
krbtgt:502:aad3b435b51404ee:[REDACTED]:::
svc_veeam_backup:1105:aad3b435b51404ee:[REDACTED]:::
...

[*] Total accounts extracted: 1,247
[*] Source: Offline backup — NO events generated on live DCs

One thousand two hundred and forty-seven domain accounts extracted from a backup image. Offline. Silent. No SIEM alert. No Event ID 4662. No detection of any kind. The backup had been taken the previous night. The credentials were current.


Beyond the Domain — What Else Backups Reveal

The domain controller backup provided credential access, but the other backups on the appliance represented equally severe data exposure risks — risks that existed independently of the domain compromise.

Backup Contents Accessible Risk
FileServers-Daily Complete file share contents including HR records, financial reports, contracts, intellectual property, and board documentation Data exfiltration — bulk access to all corporate documents without accessing the live file servers
SQL-Production Full database backup of the ERP system's SQL Server instance — customer records, order history, financial transactions, supplier data PII exposure, commercial data theft — GDPR breach, competitive intelligence
Exchange-Daily Complete Exchange database — every mailbox, every email, every attachment for all 800 staff over the retention period Email surveillance, insider knowledge, legal privilege, M&A intelligence
SCADA-Historian Historical process data from the manufacturing SCADA system — production parameters, equipment configurations, operational thresholds OT intelligence — understanding of manufacturing processes, potential for targeted OT attacks

An attacker with access to the backup infrastructure does not need to compromise individual servers. They do not need to move laterally through the network. They do not need to evade EDR on workstations. The backups contain everything — and accessing the backups generates none of the telemetry that would be generated by accessing the live systems.

This is why ransomware operators target backup infrastructure first. Destroying the backups removes the organisation's ability to recover. But accessing the backups before encrypting them provides the stolen data that enables double extortion — the threat to publish sensitive information if the ransom is not paid.


From Management Interface to Everything

Step Action Weakness Exploited
01 DNS enumeration identified backup infrastructure on dedicated VLAN Predictable hostnames; DNS records accessible from user VLAN
02 Confirmed backup VLAN management ports reachable from user VLAN Temporary firewall rules from deployment never removed
03 Accessed backup appliance via default maintenance account Secondary admin account with default credentials; firmware 2 years old
04 Exploited CVE-2023-27532 on Veeam server for credential extraction Veeam unpatched for nearly 2 years; known critical vulnerability
05 Recovered 7 credential sets including Domain Admin service account Veeam service account granted Domain Admin instead of minimum privilege
06 Mounted DC backup; extracted 1,247 domain credentials offline Backup data unencrypted; no detection of offline credential extraction

Backups Are Targets, Not Just Safety Nets

The security industry has spent years telling organisations to improve their backup resilience. The ransomware epidemic has driven massive investment in backup infrastructure — immutable storage, air-gapped copies, offline tapes, rapid recovery capabilities. This investment is essential and we strongly support it.

But resilience and security are not the same thing. An organisation can have excellent backup resilience — the ability to recover from a ransomware attack — whilst having terrible backup security — the ability to prevent an attacker from accessing the backup data in the first place.

Implicit Trust
Backup systems are implicitly trusted. They must have privileged access to every system they protect — read access to every file, every database, every mailbox. This makes them the single most privileged infrastructure in the environment. Yet they frequently receive less security attention than the systems they back up.
Appliance Blind Spots
Purpose-built appliances exist outside the standard patching and management processes. They run proprietary firmware that cannot be scanned by vulnerability management tools. They ship with secondary administrative accounts that are not documented in the customer's operational runbooks. They are treated as infrastructure, not as servers.
Detection Gaps
Accessing backup data does not generate the same telemetry as accessing live systems. There is no Windows event log entry when someone mounts a backup image. There is no EDR alert when someone extracts NTDS.dit from a backup file. The backup infrastructure is a blind spot in most detection architectures.
Encryption Gaps
Many organisations do not encrypt their backup data at rest. The rationale is that the backup infrastructure is trusted and isolated. When the isolation fails — as it did here — the unencrypted backup data is immediately accessible to anyone who can reach the storage.

Technique Mapping

T1078.001 — Default Accounts
Access to backup appliance via unchanged default maintenance account credentials.
T1190 — Exploit Public-Facing Application
Exploitation of CVE-2023-27532 on the Veeam server for unauthenticated credential extraction from the configuration database.
T1552.001 — Credentials in Files
Recovery of domain service account credentials, SQL SA passwords, and SSH root keys from the Veeam credential store.
T1003.003 — NTDS
Offline extraction of the Active Directory database (NTDS.dit) from the domain controller backup image — no live DC access required.
T1005 — Data from Local System
Access to complete backup sets containing file server data, email databases, SQL production data, and SCADA historian records.
T1562.001 — Disable or Modify Tools
Backup infrastructure access provides the ability to delete or modify backup data — the prerequisite for ransomware operations.

Recommendations and Hardening

Remediation Roadmap
Phase 1 — Immediate (0–7 days) Cost: Low
✓ Change default maintenance account password on appliance
✓ Patch Veeam to current version (CVE-2023-27532 and later)
✓ Update backup appliance firmware to current release
✓ Remove temporary firewall rules — block user VLAN to backup VLAN
✓ Reset svc_veeam_backup password; remove from Domain Admins
✓ Rotate ALL credentials stored in Veeam (all 7 sets)

Phase 2 — Short Term (7–60 days) Cost: Medium
○ Implement Veeam service account with minimum required perms
○ Enable backup encryption at rest (Veeam AES-256)
○ Enable backup encryption for data in transit
○ Restrict management interface access to dedicated admin workstations
○ Enumerate and disable all vendor maintenance accounts on appliances
○ Include backup infrastructure in vulnerability scanning scope
○ Implement MFA for Veeam console and appliance management

Phase 3 — Strategic (60–180 days) Cost: Medium–High
○ Implement immutable backup repository (hardened Linux + XFS)
○ Deploy separate credentials per backup job (not single DA account)
○ Implement backup infrastructure monitoring in SIEM
○ Establish firmware patching cycle for appliances (quarterly)
○ Test backup isolation as part of annual segmentation validation
○ Implement Veeam hardened repository with four-eyes deletion policy

The most impactful immediate change is removing the Veeam service account from Domain Admins and implementing the minimum-privilege model documented in Veeam's own hardening guide. Veeam requires specific permissions on the systems it backs up — local administrator on Windows servers, root or sudo on Linux, and specific SQL permissions for application-aware processing. These are granular, documentable permissions that do not require Domain Admin.

Backup encryption must be enabled for data at rest and in transit. If the backup data had been encrypted with a key stored separately from the backup infrastructure, the offline extraction of NTDS.dit and other sensitive data would not have been possible even with administrative access to the appliance.

Immutable backup repositories — using hardened Linux servers with XFS reflink-based immutability — ensure that backup data cannot be modified or deleted, even by an administrator with full access to the Veeam console. This is the most effective defence against ransomware operators who target backup infrastructure. It does not prevent the data access risk we demonstrated, but it protects the recovery capability.

Backup infrastructure must be included in vulnerability management and penetration testing scope. The Veeam CVE we exploited had been public for nearly two years. The appliance firmware was seven versions behind. Neither finding would have persisted if the backup infrastructure had been subject to the same patching and scanning discipline applied to production servers.


Protect the thing that protects everything.

There is a paradox at the heart of backup security. The more comprehensive the backup — the more systems it covers, the more data it contains, the more frequently it runs — the more valuable it becomes as a target. A perfect backup strategy, from a resilience perspective, creates a single location containing a copy of every piece of sensitive data the organisation owns. From a security perspective, that single location is the most valuable target in the environment.

The organisation in this engagement had invested in a modern backup infrastructure. They had a dedicated appliance, a professional backup application, a structured retention policy, and an offsite tape rotation. Their ransomware resilience was above average. But the security of the backup infrastructure itself — the firmware currency, the credential management, the network isolation, the encryption posture — had not received equivalent attention.

The backup system held a copy of everything. We accessed it through a maintenance account that nobody knew existed, on firmware that nobody had updated, via a network path that nobody had closed. The safety net was the attack surface.

Until next time — stay sharp, stay curious, and ask yourself: who has access to your backups? You might find the answer uncomfortable.

Legal Disclaimer

This article describes a penetration test conducted under formal engagement with full written authorisation from the client. All identifying details have been altered or omitted to preserve client confidentiality. Backup data was accessed only to the extent necessary to confirm the finding — no production data was exfiltrated or copied beyond the assessment environment. Unauthorised access to computer systems is a criminal offence under the Computer Misuse Act 1990 and equivalent legislation worldwide. Do not attempt to replicate these techniques without proper authorisation.



Backup resilience is not backup security. Test both.

Hedgehog Security tests the infrastructure that protects your data — backup servers, appliances, tape libraries, and cloud repositories. We assess firmware currency, credential management, network isolation, encryption posture, and the exploitability of known vulnerabilities in backup software. If your backup infrastructure has not been penetration tested, it is the most valuable untested asset in your environment.