Network-Level Authentication (NLA) Disabled via Registry Modification
Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.
Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.
Attack Chain
- Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).
- The attacker elevates privileges to modify system-level settings.
- The attacker modifies the registry key
HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthenticationto disable NLA. - The
UserAuthenticationvalue is set to “0” or “0x00000000”. - The attacker attempts to establish an RDP connection to the compromised system.
- Due to the disabled NLA, the attacker bypasses the initial authentication screen.
- The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.
- The attacker gains unauthorized access to the system.
Impact
Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.
Recommendation
- Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).
- Deploy the Sigma rule provided to detect attempts to modify the
UserAuthenticationregistry key (Sysmon Registry Events). - Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).
- Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).
Detection coverage 2
Detect NLA Disabled via Registry Modification
mediumDetects attempts to disable Network-Level Authentication by modifying the UserAuthentication registry value.
Detect NLA Disabled via Registry Modification - Sysmon
mediumDetects attempts to disable Network-Level Authentication by modifying the UserAuthentication registry value using Sysmon.
Detection queries are kept inside the platform. Get full rules →