<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Account-Manipulation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/account-manipulation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/account-manipulation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Account Configured with Never-Expiring Password</title><link>https://feed.craftedsignal.io/briefs/2024-01-never-expiring-password/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-never-expiring-password/</guid><description>Detects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.</description><content:encoded><![CDATA[<p>Attackers may abuse accounts configured with never-expiring passwords to maintain long-term access within a compromised environment. This persistence technique leverages the Active Directory setting that prevents password expiration. While sometimes legitimately used for service accounts, this configuration weakens security posture and exposes environments to credential access attacks. The rule detects Event ID 4738 (User Account Modified) with the NewUACList containing &ldquo;USER_DONT_EXPIRE_PASSWORD&rdquo;, and Event ID 5136 (Directory Service Changes) where the userAccountControl attribute is modified with specific values (66048 or 66080). These values indicate that the &lsquo;Password never expires&rsquo; flag has been set on the account. Defender should monitor for such events and take immediate remediation actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a domain-joined system, potentially through phishing or exploiting a public-facing application.</li>
<li>The attacker performs reconnaissance to identify accounts suitable for long-term persistence, focusing on privileged accounts or those with minimal monitoring.</li>
<li>The attacker uses compromised credentials or exploits a privilege escalation vulnerability to gain administrative access to Active Directory.</li>
<li>The attacker modifies the target account&rsquo;s attributes using tools like <code>net user</code> or PowerShell cmdlets from the Active Directory module.</li>
<li>Specifically, the attacker sets the <code>userAccountControl</code> attribute to disable password expiration for the chosen account.</li>
<li>The attacker validates the configuration change to ensure the password expiration is disabled, allowing for persistent access.</li>
<li>With a never-expiring password, the attacker can maintain access to the compromised account indefinitely, even after password resets or other security measures are implemented on other accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain a persistent presence within the compromised domain. This can lead to data theft, further lateral movement, or disruption of services.  The impact is increased if the affected account has elevated privileges, granting the attacker broader access to sensitive resources. While the number of affected organizations is unknown, the technique is applicable to any organization using Active Directory.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows audit policies for User Account Management and Directory Service Changes to generate relevant events.</li>
<li>Deploy the Sigma rule &ldquo;Account Configured with Never-Expiring Password&rdquo; to your SIEM and tune for your environment.</li>
<li>Regularly review and audit accounts with the &ldquo;Don&rsquo;t Expire Password&rdquo; option enabled, and enforce the use of Group Managed Service Accounts (gMSA) where appropriate.</li>
<li>Use the provided PowerShell command (<code>get-aduser -filter { passwordNeverExpires -eq $true  -and enabled -eq $true } | ft</code>) to identify accounts with passwordNeverExpires enabled across the domain.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>account-manipulation</category></item><item><title>Azure AD Account Created and Deleted Within a Close Time Frame</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</guid><description>Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.</description><content:encoded><![CDATA[<p>The creation and immediate deletion of user accounts within Azure Active Directory can be indicative of various malicious activities. Attackers may create accounts to escalate privileges, establish persistence, or gain initial access to a system. The short lifespan of these accounts suggests an attempt to evade detection. This behavior is particularly concerning as it can be used to perform actions and then quickly remove the evidence of the account&rsquo;s existence from standard audit logs. Monitoring for this activity helps defenders identify and respond to potential security breaches within their Azure environment. This technique is relevant for any organization utilizing Azure Active Directory for user management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD environment, potentially through compromised credentials or a phishing attack.</li>
<li>The attacker creates a new user account within the Azure AD. This can be achieved through the Azure portal, PowerShell, or the Azure CLI.</li>
<li>The attacker assigns elevated privileges to the newly created account. This might involve adding the account to privileged roles such as Global Administrator or assigning specific permissions to access sensitive resources.</li>
<li>The attacker uses the newly created account to perform malicious activities, such as accessing confidential data, modifying system configurations, or deploying malicious applications.</li>
<li>After completing the malicious tasks, the attacker removes the elevated privileges from the account to reduce the chances of detection during privilege reviews.</li>
<li>The attacker deletes the created account from Azure AD. This step is performed to remove the traces of the account&rsquo;s existence and hinder forensic investigations.</li>
<li>The actions performed by the short-lived account may leave other traces in logs, such as access logs or activity logs related to the resources the account interacted with.</li>
<li>The attacker aims to maintain stealth and evade detection while gaining unauthorized access to resources or establishing persistence within the Azure AD environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive resources, data breaches, and system compromise. The creation and deletion of short-lived accounts can mask malicious activities, making it difficult to trace the attacker&rsquo;s actions. Organizations using Azure AD could experience data exfiltration, financial loss, and reputational damage. Detecting such activity early is critical to preventing further damage and mitigating the impact of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to your SIEM and tune for your environment to detect suspicious account creation/deletion events in Azure AD audit logs.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to determine the scope and impact of the potential compromise.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with elevated privileges, to reduce the risk of credential compromise (reference: attack.initial-access).</li>
<li>Regularly review Azure AD audit logs for unusual account activity, focusing on accounts created and deleted within a short timeframe (logsource: azure, service: auditlogs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category><category>account-manipulation</category></item></channel></rss>