<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Active Directory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/active-directory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/active-directory/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>Active Directory Group Modification by SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</link><pubDate>Sat, 02 Nov 2024 23:59:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</guid><description>Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.</description><content:encoded><![CDATA[<p>This detection identifies a user being added to an Active Directory (AD) group by the SYSTEM account (S-1-5-18). This behavior is significant because it can indicate an attacker who has successfully achieved SYSTEM level privileges on a domain controller. Attackers typically obtain SYSTEM privileges by exploiting vulnerabilities in the domain controller, or by abusing default group privileges such as those assigned to Server Operators. Once SYSTEM access is achieved, the attacker can then attempt to pivot to a domain account. This allows them to gain persistent access and control over the AD environment. Successful exploitation enables attackers to perform actions with the privileges of the compromised account, leading to potential data breaches, system compromise, and further lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the network through various means, such as phishing or exploiting a public-facing application.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability or misconfiguration on a system within the network to achieve local administrator or SYSTEM privileges.</li>
<li><strong>Domain Controller Compromise:</strong> The attacker uses their elevated privileges to target a domain controller, exploiting vulnerabilities or weak configurations to gain SYSTEM access on the domain controller itself.</li>
<li><strong>Group Modification:</strong> Once the attacker has SYSTEM privileges on a domain controller, they use this access to add a user account to a privileged Active Directory group. This is done by modifying the group membership using tools native to the operating system.</li>
<li><strong>Persistence:</strong> By adding a user account to a privileged group, the attacker ensures they have persistent access to the domain, even if their initial access method is discovered and blocked.</li>
<li><strong>Lateral Movement:</strong> With the newly acquired group membership, the attacker can now move laterally within the network, accessing resources and systems that were previously inaccessible.</li>
<li><strong>Data Exfiltration / Impact:</strong> The attacker leverages their access to locate and exfiltrate sensitive data, or to disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a wide range of negative consequences, including data breaches, system compromise, and disruption of critical business operations. Attackers can use the compromised account to access sensitive data, modify system configurations, or even deploy ransomware. The scope of impact depends on the permissions and privileges associated with the compromised account and the targeted resources. Furthermore, the incident can damage the organization&rsquo;s reputation and result in regulatory fines and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; to generate the necessary events for detection as detailed in the <a href="https://ela.st/audit-security-group-management">setup instructions</a>.</li>
<li>Deploy the following Sigma rule to detect potential Active Directory group modifications by the SYSTEM account and tune for your environment.</li>
<li>Investigate any event with event code 4728 where the SubjectUserSid is &ldquo;S-1-5-18&rdquo; as described in the <a href="#overview">overview</a>.</li>
<li>Review the investigation guide outlined in the rule description for triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>windows</category><category>active directory</category></item><item><title>Kerberos Pre-authentication Disabled for User Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</guid><description>Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Kerberos pre-authentication requirement is disabled for a user account within an Active Directory environment. Attackers with <code>GenericWrite</code> or <code>GenericAll</code> permissions over a target account can modify the <code>UserAccountControl</code> attribute to disable pre-authentication. This configuration weakens the account&rsquo;s security posture, making it vulnerable to AS-REP roasting attacks, where attackers can request Kerberos tickets and crack the password offline. The activity is logged as Event ID 4738 in the Windows Security Event Logs, specifically when the <code>NewUACList</code> includes the <code>USER_DONT_REQUIRE_PREAUTH</code> flag. This poses a significant risk, especially if applied to privileged accounts, as it allows adversaries to potentially compromise credentials and escalate privileges within the domain. The detection is based on research and recommendations from Microsoft regarding Kerberos security best practices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an account with sufficient privileges (e.g., Domain Admin, or an account with delegated permissions) to modify user account attributes in Active Directory.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages their initial access to target a specific user account for which they intend to disable Kerberos pre-authentication.</li>
<li><strong>Account Modification:</strong> The attacker modifies the <code>UserAccountControl</code> attribute of the target user account, specifically disabling the &ldquo;Do not require pre-authentication&rdquo; setting (setting the <code>USER_DONT_REQUIRE_PREAUTH</code> flag). This is often done using tools like <code>Active Directory Users and Computers</code> or PowerShell cmdlets.</li>
<li><strong>Event Logging:</strong> The modification triggers a Windows Security Event Log event (Event ID 4738) on the Domain Controller, indicating that the user account attribute has been changed. The <code>NewUACList</code> field in the event data contains <code>USER_DONT_REQUIRE_PREAUTH</code>.</li>
<li><strong>AS-REQ Request:</strong> The attacker crafts an AS-REQ (Authentication Service Request) to the Kerberos Key Distribution Center (KDC) for the targeted user account. Since pre-authentication is disabled, the KDC processes the request without requiring pre-authentication.</li>
<li><strong>AS-REP Response:</strong> The KDC issues an AS-REP (Authentication Service Response) to the attacker, containing an encrypted Ticket Granting Ticket (TGT) for the targeted user account.</li>
<li><strong>Offline Cracking:</strong> The attacker extracts the encrypted TGT from the AS-REP response and attempts to crack it offline using password cracking tools and techniques, such as hashcat or John the Ripper.</li>
<li><strong>Credential Access:</strong> Upon successfully cracking the TGT, the attacker obtains the plaintext password for the targeted user account. This password can then be used for lateral movement, privilege escalation, and further malicious activities within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising user accounts through AS-REP roasting can have significant consequences. Attackers can gain unauthorized access to sensitive resources, escalate privileges, and move laterally within the network. Successful AS-REP roasting leads to credential compromise, which could result in data breaches, system compromise, and disruption of services. Organizations failing to monitor and prevent Kerberos pre-authentication disabling are at an increased risk of credential theft and subsequent exploitation, potentially affecting all systems within the compromised domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit User Account Management&rdquo; and ensure Windows Security Event Logs (specifically Event ID 4738) are being collected and forwarded to your SIEM for analysis as described in the setup instructions linked in the rule source.</li>
<li>Deploy the provided Sigma rule to detect Event ID 4738 events where the <code>NewUACList</code> contains <code>USER_DONT_REQUIRE_PREAUTH</code> within your environment to identify potential AS-REP roasting vulnerabilities.</li>
<li>Investigate any instances of disabled pre-authentication, especially on privileged accounts, following the triage steps outlined in the rule documentation.</li>
<li>Enforce the principle of least privilege by reviewing and restricting the privileges assigned to users and groups to prevent unauthorized modification of Active Directory user account attributes.</li>
<li>Monitor for suspicious Kerberos authentication patterns and investigate any anomalies that might indicate AS-REP roasting attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberos</category><category>credential-access</category><category>as-rep-roasting</category><category>active-directory</category><category>windows</category></item><item><title>Active Directory msPKIAccountCredentials Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-cred-roaming/</link><pubDate>Fri, 26 Jan 2024 18:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cred-roaming/</guid><description>Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.</description><content:encoded><![CDATA[<p>The msPKIAccountCredentials attribute in Active Directory stores encrypted credential data, including private keys and certificates. An attacker can modify this attribute to escalate privileges by overwriting an arbitrary file. This is achieved by modifying the msPKIAccountCredentials attribute of a user object with malicious credential objects. Successful exploitation allows the attacker to gain elevated privileges within the domain. The attack leverages the Windows credential roaming feature to inject these malicious credentials. This activity is detected via event code 5136 in the Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a domain-joined system, possibly through compromised credentials or phishing.</li>
<li>The attacker identifies a target Active Directory user account to manipulate.</li>
<li>The attacker crafts a malicious payload containing an encrypted credential object.</li>
<li>The attacker uses a tool or script (e.g., PowerShell, adsiedit.msc) to modify the target user&rsquo;s msPKIAccountCredentials attribute in Active Directory.</li>
<li>The attacker triggers credential roaming, causing the modified attribute to be propagated to other domain-joined systems where the target user logs in.</li>
<li>When the target user logs in, the malicious credential object is processed, potentially overwriting a critical system file.</li>
<li>The attacker leverages the overwritten file to execute arbitrary code with elevated privileges.</li>
<li>The attacker achieves privilege escalation and gains further access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the msPKIAccountCredentials attribute can lead to complete domain compromise. Attackers can gain control over critical systems and data within the Active Directory environment. While the exact number of potential victims is unknown, any organization utilizing Active Directory is potentially vulnerable. This attack allows for lateral movement, data exfiltration, and potentially the deployment of ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary event logs (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule <code>Modification of msPKIAccountCredentials in Active Directory</code> to detect suspicious modifications of the attribute.</li>
<li>Review and harden Active Directory access controls, limiting which accounts can modify the <code>msPKIAccountCredentials</code> attribute.</li>
<li>Monitor event code 5136 in the Windows Security Event Logs for modifications to the <code>msPKIAccountCredentials</code> attribute.</li>
<li>Create exceptions in your SIEM for authorized administrative accounts that legitimately modify this attribute to reduce false positives as described in the &ldquo;False positive analysis&rdquo; section above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>credential-roaming</category><category>active-directory</category><category>windows</category></item><item><title>Potential Kerberos Coercion via DNS-Based SPN Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</guid><description>Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos coercion attempts via DNS-based SPN spoofing on Windows systems. The technique abuses MicrosoftDNS records, specifically looking for directory-service access or creation events (event codes 4662 and 5137) involving a MicrosoftDNS record that contains a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, a known indicator of DNS-based SPN spoofing used in Kerberos coercion tradecraft. The goal is to detect adversaries coercing victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services. This activity is typically observed within Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to a system with privileges to modify DNS records in Active Directory.</li>
<li>The attacker creates a new MicrosoftDNS record or modifies an existing one.</li>
<li>Within the DNS record, specifically in the <code>AdditionalInfo</code> or <code>ObjectDN</code> attributes, the attacker inserts a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob contains a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The attacker configures the DNS record to point to an attacker-controlled host. This involves manipulating the record&rsquo;s name and associated IP address.</li>
<li>The attacker triggers a victim system to resolve the manipulated DNS record, causing the victim to attempt Kerberos authentication with the attacker-controlled host, believing it to be a legitimate service.</li>
<li>The attacker intercepts the Kerberos authentication request.</li>
<li>The attacker relays the Kerberos ticket to a legitimate service, impersonating the victim system.</li>
<li>The attacker gains unauthorized access to the legitimate service using the relayed Kerberos ticket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberos coercion can grant attackers unauthorized access to critical systems and services within the Active Directory domain. This may lead to privilege escalation, lateral movement, data exfiltration, and other malicious activities. The scope of impact depends on the permissions and access rights of the coerced victim system and the targeted services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; and &ldquo;Audit Directory Service Changes&rdquo; Windows audit policies to ensure relevant events are logged (Setup section).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential Kerberos coercion attempts via DNS-based SPN spoofing. Tune the rules based on your environment and known legitimate activity.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the associated user accounts, systems, and modified DNS records (rule titles).</li>
<li>Restrict access to modify DNS records in Active Directory to only authorized personnel and systems to prevent unauthorized manipulation (Overview section).</li>
<li>Monitor Windows Security authentication events for any suspicious Kerberos activity following the modification of DNS records (Attack Chain steps 5-8).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>coercion</category><category>dns</category><category>spn</category><category>spoofing</category><category>credential-access</category></item><item><title>First Time Seen Account Performing DCSync</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</guid><description>Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.</description><content:encoded><![CDATA[<p>The DCSync attack is a technique used to retrieve credential information from Active Directory, potentially leading to complete domain compromise. This attack involves initiating the Active Directory replication process, which is normally reserved for domain controllers. This detection identifies user accounts initiating this process for the first time, which can be an indicator of malicious activity. This activity is detected via Windows Security Event Logs and focuses on the identification of the initial use of replication protocols. Attackers exploit this to steal credentials or sensitive data stored within the Active Directory. This technique can be used to escalate privileges and move laterally within the network, eventually leading to data exfiltration or other malicious objectives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network.</li>
<li>The attacker escalates privileges to obtain the necessary rights to perform DCSync. This may involve exploiting vulnerabilities or using stolen credentials.</li>
<li>The attacker uses a tool like Mimikatz or custom scripts to initiate the Active Directory replication process.</li>
<li>The tool requests replication of directory data, specifically targeting credential information. This involves using the <code>DS-Replication-Get-Changes</code> or similar replication-right GUIDs.</li>
<li>The Active Directory server responds by providing the requested data, which includes password hashes and other sensitive information.</li>
<li>The attacker extracts the credential information from the replicated data.</li>
<li>The attacker uses the extracted credentials to move laterally within the network and access other systems or data.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or long-term persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DCSync attack can lead to the compromise of the entire Active Directory domain. This can result in widespread data breaches, loss of sensitive information, and significant disruption to business operations. Attackers can gain access to critical systems and data, potentially leading to financial losses, reputational damage, and legal liabilities. The number of potential victims is dependent on the size of the compromised Active Directory environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to generate the necessary Windows Security Event Logs (event code 4662) as described in the <a href="https://ela.st/audit-directory-service-access">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect First Time DCSync Activity&rdquo; to your SIEM and tune for your environment to identify suspicious DCSync behavior.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>SubjectUserSid</code>, <code>SubjectUserName</code>, <code>Properties</code>, <code>AccessMask</code>, and <code>computer_name</code> fields in the Windows Security Event Logs.</li>
<li>Monitor for changes to Active Directory object permissions (5136 events) that could grant unauthorized users DCSync capabilities as outlined in the triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>windows</category><category>active-directory</category></item><item><title>Detection of Sensitive LDAP Attribute Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</link><pubDate>Fri, 19 Jan 2024 16:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</guid><description>This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.</description><content:encoded><![CDATA[<p>This detection rule identifies attempts to access sensitive attributes within Active Directory via the Lightweight Directory Access Protocol (LDAP). These attributes, including <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, and <code>msPKI-CredentialRoamingTokens</code>, are valuable targets for adversaries aiming to steal credentials or escalate privileges. The rule focuses on Windows Security Event Logs, specifically monitoring event code 4662 which indicates an attempt to access an object. By filtering out common benign access patterns, such as those originating from the SYSTEM account or using specific access masks, the rule aims to highlight potentially malicious activity that warrants further investigation. The original rule was created in November 2022 and updated in May 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target domain (e.g., through phishing or exploiting a public-facing application).</li>
<li>The attacker uses valid credentials or exploits a vulnerability to authenticate to the domain.</li>
<li>The attacker uses LDAP queries to enumerate Active Directory objects.</li>
<li>The attacker crafts specific LDAP queries to target sensitive attributes like <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, or <code>msPKI-CredentialRoamingTokens</code>.</li>
<li>Windows Security Event 4662 is generated, logging the access attempt with details about the user, accessed object, and properties.</li>
<li>The attacker exfiltrates the accessed attribute data, potentially containing password hashes, certificates, or other sensitive information.</li>
<li>The attacker uses the stolen credentials or certificates to impersonate other users or gain elevated privileges within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain accounts, including privileged accounts. Attackers can use stolen credentials to move laterally within the network, access sensitive data, and disrupt business operations. Depending on the attributes accessed, this could also expose private keys and authentication certificates leading to further attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Access to Sensitive LDAP Attributes&rdquo; to your SIEM to detect access attempts to critical AD attributes (rule.name).</li>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to ensure that necessary Windows Security Event Logs (event code 4662) are generated for the Sigma rule to function (setup).</li>
<li>Review and tune the &ldquo;Access to Sensitive LDAP Attributes&rdquo; Sigma rule, creating exceptions for legitimate administrative accounts and scheduled system processes to minimize false positives (rule.note).</li>
<li>Implement stricter access controls and permissions for sensitive LDAP attributes within Active Directory to restrict access to only necessary personnel (rule.note).</li>
<li>Investigate any triggered alerts from the Sigma rule, focusing on identifying the user/process attempting access (winlog.event_data.SubjectUserSid) and the specific sensitive attribute accessed (winlog.event_data.Properties) (rule.note).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>collection</category><category>windows</category></item><item><title>SeEnableDelegationPrivilege Assignment Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</link><pubDate>Wed, 03 Jan 2024 17:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</guid><description>Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.</description><content:encoded><![CDATA[<p>The SeEnableDelegationPrivilege user right, when assigned to a security principal, allows that principal to be trusted for delegation within Active Directory. Attackers can abuse this right to compromise accounts and elevate privileges by impersonating other users or services. This technique can be used for lateral movement, persistence, and ultimately, domain dominance. Defenders should monitor for the assignment of this privilege, especially to accounts that should not have it. The targeted behavior is logged as event ID 4704 in Windows Security logs. This activity is critical to monitor as it represents a powerful tool for attackers to move laterally and maintain persistence within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised account with sufficient privileges to modify user rights.</li>
<li>The attacker assigns the SeEnableDelegationPrivilege to a target account using tools like <code>ntrights.exe</code> or PowerShell cmdlets.</li>
<li>Windows Security Event 4704 is generated, logging the privilege assignment.</li>
<li>The attacker modifies the target account&rsquo;s attributes, such as <code>userAccountControl</code> or <code>msDS-AllowedToDelegateTo</code>, to enable delegation.</li>
<li>The attacker leverages Kerberos delegation to impersonate other users or services.</li>
<li>Using the impersonated credentials, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>The attacker moves laterally within the network, compromising additional systems and accounts.</li>
<li>The attacker achieves their final objective, such as data exfiltration or domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise Active Directory accounts and elevate privileges, potentially leading to full control over the domain. The impact includes unauthorized access to sensitive data, lateral movement to critical systems, and the potential for long-term persistence. Depending on the compromised accounts, the entire organization can be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Authorization Policy Change&rdquo; to generate Windows Security Event ID 4704 (Setup instructions: <a href="https://ela.st/audit-authorization-policy-change)">https://ela.st/audit-authorization-policy-change)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Sensitive Privilege SeEnableDelegationPrivilege assigned to a Principal&rdquo; to your SIEM to detect the assignment of this privilege.</li>
<li>Investigate any instances where SeEnableDelegationPrivilege is assigned, focusing on the targeted account and the source of the change.</li>
<li>Monitor for modifications to delegation-related attributes on user and computer objects.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>windows</category><category>active-directory</category></item><item><title>Potential Shadow Credentials added to AD Object</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</link><pubDate>Wed, 03 Jan 2024 14:57:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</guid><description>This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.</description><content:encoded><![CDATA[<p>The &ldquo;Shadow Credentials&rdquo; attack involves manipulating the <code>msDS-KeyCredentialLink</code> attribute in Active Directory (AD) to gain unauthorized access to user or computer accounts. Attackers can create a key pair, append the raw public key to the attribute, and authenticate as the target object. This technique allows for persistent and stealthy access, as it leverages Kerberos key trust account mapping. The original detection rule was created in January 2022 and last updated in April 2026. This attack abuses control over an object to create the shadow credentials. Defenders should monitor for modifications to the <code>msDS-KeyCredentialLink</code> attribute, especially those not associated with legitimate Azure AD Connect or ADFS provisioning.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains initial access to a system with sufficient privileges to modify Active Directory objects.</li>
<li><strong>Discovery:</strong> The attacker identifies a target user or computer object within Active Directory to compromise.</li>
<li><strong>Credential Access:</strong> The attacker generates a new key pair.</li>
<li><strong>Privilege Escalation:</strong> The attacker modifies the <code>msDS-KeyCredentialLink</code> attribute of the target object to include the attacker&rsquo;s public key. This requires specific permissions on the target object.</li>
<li><strong>Persistence:</strong> The attacker uses the private key to authenticate as the target object, bypassing normal authentication mechanisms.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised account to move laterally within the network, accessing resources and systems.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data exfiltration, system compromise, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent and stealthy access to Active Directory objects, potentially compromising sensitive accounts and resources. Shadow Credentials can be used to bypass multi-factor authentication and other security controls, leading to significant data breaches or system-wide compromises. Without proper monitoring and alerting, these attacks can remain undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs, specifically event ID 5136, for modifications to the <code>msDS-KeyCredentialLink</code> attribute as described in the rule description.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious modifications to the <code>msDS-KeyCredentialLink</code> attribute, and tune for your environment.</li>
<li>Implement strict access controls and auditing on Active Directory objects, particularly those with sensitive privileges, to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the <code>winlog.event_data.ObjectDN</code>, <code>winlog.event_data.SubjectUserName</code>, and <code>winlog.event_data.AttributeValue</code> fields to determine the legitimacy of the changes.</li>
<li>Follow the triage and analysis steps in the rule&rsquo;s <code>note</code> field to investigate alerts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>shadow-credentials</category><category>windows</category></item><item><title>User Added to Privileged Group in Active Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</guid><description>Adversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.</description><content:encoded><![CDATA[<p>Attackers often target Active Directory (AD) to gain control over a network. Adding a user account to a highly privileged group, such as Domain Admins or Enterprise Admins, is a common tactic for establishing persistence and escalating privileges. By compromising an account with the ability to manage group memberships or exploiting vulnerabilities, an attacker can add their own rogue account to a privileged group, granting them extensive control over the AD domain. This activity might go unnoticed amidst legitimate administrative actions, making it a stealthy method of maintaining unauthorized access. This is a common technique employed after initial compromise to ensure long-term access to critical systems and data. Detecting such additions requires careful monitoring of AD security logs for specific events related to group membership changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a low-privileged user account through phishing or credential theft.</li>
<li>Lateral movement to a system with access to Active Directory management tools.</li>
<li>Privilege escalation to an account with permissions to modify group memberships (e.g., leveraging exploits or credential dumping).</li>
<li>Use of AD management tools (e.g., Active Directory Users and Computers, PowerShell with AD module) to add the attacker-controlled user account to a privileged group, such as Domain Admins (RID 512).</li>
<li>The attacker logs in with the newly privileged account.</li>
<li>The attacker uses their elevated privileges to access sensitive data, install backdoors, or perform other malicious activities.</li>
<li>The attacker may attempt to remove the initially compromised account to remove traces of their activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of an attacker-controlled user to a privileged AD group grants them near-total control over the domain. This can lead to widespread data breaches, ransomware deployment across the entire network, compromise of sensitive systems, and long-term disruption of business operations. The impact can extend to all domain-joined systems and resources, potentially affecting thousands of users and devices. Remediation often requires a complete rebuild of the Active Directory environment, resulting in significant downtime and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; in Active Directory to generate the necessary security events for detecting group membership changes.</li>
<li>Deploy the Sigma rule &ldquo;User Added to Privileged Group in Active Directory&rdquo; to your SIEM to detect suspicious additions to privileged groups, tuning the rule for known administrative accounts.</li>
<li>Monitor for unexpected use of AD management tools, such as <code>Active Directory Users and Computers</code> or <code>PowerShell</code> with the <code>AD</code> module, especially from unusual source hosts.</li>
<li>Investigate any alerts generated by the Sigma rule by verifying the legitimacy of the user adding members to the group and validating the need for the new member to have those privileges.</li>
<li>Regularly review the membership of privileged groups and remove any unauthorized or unnecessary accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>active_directory</category></item><item><title>Account Configured with Never-Expiring Password</title><link>https://feed.craftedsignal.io/briefs/2024-01-never-expiring-password/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-never-expiring-password/</guid><description>Detects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.</description><content:encoded><![CDATA[<p>Attackers may abuse accounts configured with never-expiring passwords to maintain long-term access within a compromised environment. This persistence technique leverages the Active Directory setting that prevents password expiration. While sometimes legitimately used for service accounts, this configuration weakens security posture and exposes environments to credential access attacks. The rule detects Event ID 4738 (User Account Modified) with the NewUACList containing &ldquo;USER_DONT_EXPIRE_PASSWORD&rdquo;, and Event ID 5136 (Directory Service Changes) where the userAccountControl attribute is modified with specific values (66048 or 66080). These values indicate that the &lsquo;Password never expires&rsquo; flag has been set on the account. Defender should monitor for such events and take immediate remediation actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a domain-joined system, potentially through phishing or exploiting a public-facing application.</li>
<li>The attacker performs reconnaissance to identify accounts suitable for long-term persistence, focusing on privileged accounts or those with minimal monitoring.</li>
<li>The attacker uses compromised credentials or exploits a privilege escalation vulnerability to gain administrative access to Active Directory.</li>
<li>The attacker modifies the target account&rsquo;s attributes using tools like <code>net user</code> or PowerShell cmdlets from the Active Directory module.</li>
<li>Specifically, the attacker sets the <code>userAccountControl</code> attribute to disable password expiration for the chosen account.</li>
<li>The attacker validates the configuration change to ensure the password expiration is disabled, allowing for persistent access.</li>
<li>With a never-expiring password, the attacker can maintain access to the compromised account indefinitely, even after password resets or other security measures are implemented on other accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain a persistent presence within the compromised domain. This can lead to data theft, further lateral movement, or disruption of services.  The impact is increased if the affected account has elevated privileges, granting the attacker broader access to sensitive resources. While the number of affected organizations is unknown, the technique is applicable to any organization using Active Directory.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows audit policies for User Account Management and Directory Service Changes to generate relevant events.</li>
<li>Deploy the Sigma rule &ldquo;Account Configured with Never-Expiring Password&rdquo; to your SIEM and tune for your environment.</li>
<li>Regularly review and audit accounts with the &ldquo;Don&rsquo;t Expire Password&rdquo; option enabled, and enforce the use of Group Managed Service Accounts (gMSA) where appropriate.</li>
<li>Use the provided PowerShell command (<code>get-aduser -filter { passwordNeverExpires -eq $true  -and enabled -eq $true } | ft</code>) to identify accounts with passwordNeverExpires enabled across the domain.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>account-manipulation</category></item><item><title>User Account ServicePrincipalName Attribute Modified</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberoasting-spn-modified/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberoasting-spn-modified/</guid><description>Detection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>servicePrincipalName</code> (SPN) attribute of user accounts within Active Directory. Attackers can exploit write privileges over a user account to configure SPNs, enabling them to perform Kerberoasting attacks. While administrators may configure SPNs legitimately, this exposes the account to potential abuse. The risk arises because user-defined passwords are often less complex than machine account passwords, making them vulnerable to cracking. The rule focuses on identifying when a user account is at increased risk due to SPN modifications, indicating potential Kerberoasting vulnerabilities. The original Elastic rule was published on 2022-02-22 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with a user account that possesses write privileges to other user accounts within Active Directory.</li>
<li>The attacker identifies a target user account for which they want to perform Kerberoasting.</li>
<li>The attacker modifies the <code>servicePrincipalName</code> attribute of the target user account using tools like <code>SetSPN.exe</code> or PowerShell.</li>
<li>A Kerberos client requests a ticket-granting service (TGS) ticket for the modified SPN.</li>
<li>The domain controller encrypts the TGS ticket with the secret key (NTLM hash) of the target user account.</li>
<li>The attacker extracts the encrypted TGS ticket from network traffic or the Kerberos client cache.</li>
<li>The attacker performs offline password cracking on the extracted TGS ticket to recover the plaintext password of the target user account using tools like Hashcat or John the Ripper.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to resources or perform lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberoasting attacks can compromise user account credentials, potentially leading to unauthorized access to sensitive resources and lateral movement within the network. If privileged accounts are compromised, attackers can gain control over critical systems and data, leading to data breaches, system disruptions, and financial losses. The number of victims depends on the permissions of the compromised account and the scope of the attacker&rsquo;s access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor &ldquo;Audit Directory Service Changes&rdquo; in Windows Security Event Logs to generate the events required for the detection rule (reference: <a href="https://ela.st/audit-directory-service-changes">https://ela.st/audit-directory-service-changes</a>).</li>
<li>Deploy the &ldquo;User account exposed to Kerberoasting&rdquo; Sigma rule to your SIEM and tune it based on your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the user account that performed the SPN modification and whether the modification was legitimate (reference: Sigma rule).</li>
<li>Implement Group Managed Service Accounts (gMSA) for services running under user accounts to ensure strong and automatically rotated passwords (reference: <a href="https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview">https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview</a>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberoasting</category><category>credential-access</category><category>windows</category><category>spn</category></item><item><title>Suspicious Access to LDAP Attributes</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</guid><description>The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.</description><content:encoded><![CDATA[<p>This rule identifies read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information. The rule focuses on event code 4662, filtering for &lsquo;Read Property&rsquo; access where the number of properties accessed is greater than or equal to 2000. The rule is designed to detect potential reconnaissance activities within an Active Directory environment, providing security teams with insights into unusual access patterns that may indicate malicious intent. This detection logic helps security teams proactively identify and respond to potential threats targeting Active Directory environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the target network, possibly through compromised credentials or a phishing attack (not directly covered in the provided source).</li>
<li>The attacker uses the compromised account to query Active Directory via LDAP.</li>
<li>The attacker issues a series of LDAP queries, requesting a large number of attributes for various Active Directory objects, triggering event ID 4662.</li>
<li>The event logs record the excessive number of read property accesses (winlog.event_data.Properties), exceeding the threshold of 2000.</li>
<li>The attacker analyzes the gathered information to identify potential targets, such as privileged accounts, sensitive data stores, or vulnerable systems.</li>
<li>The attacker attempts to elevate privileges by exploiting identified vulnerabilities or misconfigurations within Active Directory.</li>
<li>The attacker uses the elevated privileges to access sensitive information or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gather sensitive information about the Active Directory environment, identify potential vulnerabilities, elevate privileges, and move laterally within the network. This can lead to data breaches, system compromise, and significant disruption to business operations. The number of victims and sectors targeted are dependent on the scope and objectives of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Access to generate the necessary events (event code 4662) as mentioned in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Access to LDAP Attributes&rdquo; to your SIEM and tune the threshold (length(winlog.event_data.Properties) &gt;= 2000) for your environment.</li>
<li>Review event logs for event code 4662, focusing on the <code>winlog.event_data.Properties</code> field, to understand which attributes were accessed.</li>
<li>Investigate the source machine from which the LDAP queries originated by examining the <code>winlog.event_data.SubjectUserSid</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active_directory</category><category>ldap</category><category>discovery</category><category>windows</category></item></channel></rss>