Potential WPAD Spoofing via DNS Record Creation
Detection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.
Web Proxy Auto-Discovery (WPAD) is a protocol that allows devices to automatically discover proxy settings, but it can be exploited by attackers to redirect traffic through malicious proxies. This detection identifies the creation of a “wpad” DNS record, which is a common technique used in WPAD spoofing attacks. Attackers can disable the Global Query Block List (GQBL) and create a rogue “wpad” record. The event code 5137 is logged when directory service changes are made, and this rule focuses on changes related to the creation of wpad records. This is important for defenders because successful WPAD spoofing can lead to credential access and lateral movement within the network.
Attack Chain
- The attacker gains initial access to a system with sufficient privileges to modify DNS records, often an Active Directory account.
- The attacker disables the Global Query Block List (GQBL) to allow the creation of unauthorized DNS records.
- The attacker creates a new DNS record for “wpad” in Active Directory DNS, using event code 5137.
- The ‘ObjectDN’ attribute of the DNS record contains “DC=wpad,*”.
- Clients on the network query the DNS server for the “wpad” record.
- The DNS server responds with the attacker-controlled IP address.
- Clients automatically configure their proxy settings to use the attacker’s proxy server.
- The attacker intercepts network traffic, potentially capturing credentials and sensitive data.
Impact
Successful WPAD spoofing can allow attackers to intercept sensitive information, including credentials, as users browse the web. This can lead to further compromise of systems and data within the network. While the number of victims is difficult to quantify, the impact can be significant within an organization if the attack is successful. This attack targets organizations using default WPAD settings.
Recommendation
- Enable Audit Directory Service Changes to generate Windows Security Event Logs (event code 5137) as described in the setup instructions to ensure the rule functions correctly.
- Deploy the Sigma rule “Potential WPAD Spoofing via DNS Record Creation” to your SIEM to detect suspicious “wpad” record creations.
- Review Active Directory change history when the Sigma rule triggers to determine who made the changes to the DNS records and whether these changes were authorized, as outlined in the investigation guide.
- Regularly verify the configuration of the Global Query Block List (GQBL) to ensure it has not been disabled or altered, as described in the investigation guide.
Detection coverage 2
Potential WPAD Spoofing via DNS Record Creation
mediumDetects the creation of a DNS record that is potentially meant to enable WPAD spoofing by monitoring Windows Event ID 5137 for specific ObjectDN values.
WPAD DNS Record Creation via PowerShell
mediumDetects the creation of a DNS record that is potentially meant to enable WPAD spoofing by monitoring PowerShell command lines.
Detection queries are kept inside the platform. Get full rules →