<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure AD Connect — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/azure-ad-connect/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:57:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/azure-ad-connect/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Shadow Credentials added to AD Object</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</link><pubDate>Wed, 03 Jan 2024 14:57:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</guid><description>This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.</description><content:encoded><![CDATA[<p>The &ldquo;Shadow Credentials&rdquo; attack involves manipulating the <code>msDS-KeyCredentialLink</code> attribute in Active Directory (AD) to gain unauthorized access to user or computer accounts. Attackers can create a key pair, append the raw public key to the attribute, and authenticate as the target object. This technique allows for persistent and stealthy access, as it leverages Kerberos key trust account mapping. The original detection rule was created in January 2022 and last updated in April 2026. This attack abuses control over an object to create the shadow credentials. Defenders should monitor for modifications to the <code>msDS-KeyCredentialLink</code> attribute, especially those not associated with legitimate Azure AD Connect or ADFS provisioning.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains initial access to a system with sufficient privileges to modify Active Directory objects.</li>
<li><strong>Discovery:</strong> The attacker identifies a target user or computer object within Active Directory to compromise.</li>
<li><strong>Credential Access:</strong> The attacker generates a new key pair.</li>
<li><strong>Privilege Escalation:</strong> The attacker modifies the <code>msDS-KeyCredentialLink</code> attribute of the target object to include the attacker&rsquo;s public key. This requires specific permissions on the target object.</li>
<li><strong>Persistence:</strong> The attacker uses the private key to authenticate as the target object, bypassing normal authentication mechanisms.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised account to move laterally within the network, accessing resources and systems.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data exfiltration, system compromise, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent and stealthy access to Active Directory objects, potentially compromising sensitive accounts and resources. Shadow Credentials can be used to bypass multi-factor authentication and other security controls, leading to significant data breaches or system-wide compromises. Without proper monitoring and alerting, these attacks can remain undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs, specifically event ID 5136, for modifications to the <code>msDS-KeyCredentialLink</code> attribute as described in the rule description.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious modifications to the <code>msDS-KeyCredentialLink</code> attribute, and tune for your environment.</li>
<li>Implement strict access controls and auditing on Active Directory objects, particularly those with sensitive privileges, to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the <code>winlog.event_data.ObjectDN</code>, <code>winlog.event_data.SubjectUserName</code>, and <code>winlog.event_data.AttributeValue</code> fields to determine the legitimacy of the changes.</li>
<li>Follow the triage and analysis steps in the rule&rsquo;s <code>note</code> field to investigate alerts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>shadow-credentials</category><category>windows</category></item><item><title>Potential Credential Access via DCSync</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-dcsync-replication/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-dcsync-replication/</guid><description>This rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.</description><content:encoded><![CDATA[<p>The DCSync attack is a technique that allows an attacker to use the Windows Domain Controller&rsquo;s API to simulate the replication process from a remote domain controller. This enables the attacker to compromise critical credential material, such as Kerberos krbtgt keys, which can then be used for ticket creation and forgery. This attack requires specific privileges (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All), typically granted to members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups. This rule focuses on detecting the initiation of the Active Directory replication process by user accounts, which could indicate a DCSync attack. The rule specifically monitors for Event ID 4662, filtering out computer accounts and Azure AD Connect MSOL accounts to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with a privileged account (e.g., Domain Admin).</li>
<li>The attacker uses the privileged account to grant an attacker-controlled object the right to DCsync/Replicate.</li>
<li>The attacker initiates an Active Directory replication process using the granted rights.</li>
<li>Windows generates Event ID 4662 (Operation was performed on an Active Directory object) with Access Mask 0x100 (Control Access).</li>
<li>The event properties include DS-Replication-Get-Changes or DS-Replication-Get-Changes-All or DS-Replication-Get-Changes-In-Filtered-Set.</li>
<li>The attacker extracts sensitive information such as password hashes.</li>
<li>The attacker forges Kerberos tickets using the compromised credentials.</li>
<li>The attacker achieves domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DCSync attack can lead to the compromise of the entire Active Directory domain. Attackers can steal credential information, including the krbtgt key, allowing them to forge Kerberos tickets and gain unauthorized access to any resource within the domain. This can lead to data breaches, system outages, and significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to generate the required event logs (Event ID 4662) for detection, as indicated in the <a href="https://ela.st/audit-directory-service-access">setup instructions</a>.</li>
<li>Deploy the provided Sigma rule <code>Detect Potential DCSync Activity</code> to identify suspicious Active Directory replication events in your SIEM.</li>
<li>Investigate any alerts generated by the Sigma rule by correlating security events 4662 and 4624 by Logon ID on the Domain Controller.</li>
<li>Review and restrict the privileges granted to accounts with DS-Replication-Get-Changes and DS-Replication-Get-Changes-All rights.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>windows</category><category>active-directory</category></item></channel></rss>