<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ADFS — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/adfs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:57:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/adfs/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Shadow Credentials added to AD Object</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</link><pubDate>Wed, 03 Jan 2024 14:57:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</guid><description>This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.</description><content:encoded><![CDATA[<p>The &ldquo;Shadow Credentials&rdquo; attack involves manipulating the <code>msDS-KeyCredentialLink</code> attribute in Active Directory (AD) to gain unauthorized access to user or computer accounts. Attackers can create a key pair, append the raw public key to the attribute, and authenticate as the target object. This technique allows for persistent and stealthy access, as it leverages Kerberos key trust account mapping. The original detection rule was created in January 2022 and last updated in April 2026. This attack abuses control over an object to create the shadow credentials. Defenders should monitor for modifications to the <code>msDS-KeyCredentialLink</code> attribute, especially those not associated with legitimate Azure AD Connect or ADFS provisioning.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains initial access to a system with sufficient privileges to modify Active Directory objects.</li>
<li><strong>Discovery:</strong> The attacker identifies a target user or computer object within Active Directory to compromise.</li>
<li><strong>Credential Access:</strong> The attacker generates a new key pair.</li>
<li><strong>Privilege Escalation:</strong> The attacker modifies the <code>msDS-KeyCredentialLink</code> attribute of the target object to include the attacker&rsquo;s public key. This requires specific permissions on the target object.</li>
<li><strong>Persistence:</strong> The attacker uses the private key to authenticate as the target object, bypassing normal authentication mechanisms.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised account to move laterally within the network, accessing resources and systems.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data exfiltration, system compromise, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent and stealthy access to Active Directory objects, potentially compromising sensitive accounts and resources. Shadow Credentials can be used to bypass multi-factor authentication and other security controls, leading to significant data breaches or system-wide compromises. Without proper monitoring and alerting, these attacks can remain undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs, specifically event ID 5136, for modifications to the <code>msDS-KeyCredentialLink</code> attribute as described in the rule description.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious modifications to the <code>msDS-KeyCredentialLink</code> attribute, and tune for your environment.</li>
<li>Implement strict access controls and auditing on Active Directory objects, particularly those with sensitive privileges, to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the <code>winlog.event_data.ObjectDN</code>, <code>winlog.event_data.SubjectUserName</code>, and <code>winlog.event_data.AttributeValue</code> fields to determine the legitimacy of the changes.</li>
<li>Follow the triage and analysis steps in the rule&rsquo;s <code>note</code> field to investigate alerts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>shadow-credentials</category><category>windows</category></item></channel></rss>