<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Active Directory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/active-directory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/active-directory/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-active-directory-code-execution/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-active-directory-code-execution/</guid><description>An improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.</description><content:encoded><![CDATA[<p>CVE-2026-33826 is a vulnerability affecting Windows Active Directory. It stems from improper input validation, potentially enabling an authenticated attacker positioned on an adjacent network to achieve remote code execution. The vulnerability&rsquo;s impact is significant, as successful exploitation could allow attackers to gain control over critical domain infrastructure. The CVE was published on 2026-04-14. While the specific attack vector isn&rsquo;t detailed in the initial vulnerability description, the adjacent network requirement suggests that the attacker must be on the same physical or logical network segment as the targeted Active Directory server. Exploitation requires an authenticated user, limiting the scope of potential attackers to those with existing domain credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains valid credentials within the Active Directory domain through compromised accounts or other means.</li>
<li><strong>Network Proximity:</strong> The attacker positions themselves on the same physical or logical network segment as the target Active Directory server.</li>
<li><strong>Vulnerability Trigger:</strong> The attacker crafts a malicious request containing invalid input designed to exploit the input validation flaw in Active Directory. This request could target a specific Active Directory service or API.</li>
<li><strong>Exploitation:</strong> Active Directory processes the malicious request, failing to properly validate the input, and executing attacker-controlled code within the context of the Active Directory service.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages the initially gained code execution to escalate privileges within the Active Directory environment, potentially targeting domain administrator rights.</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker moves laterally across the network, compromising additional systems and services within the domain.</li>
<li><strong>Persistence:</strong> The attacker establishes persistent access to the Active Directory environment, ensuring continued control even after system restarts or security mitigations.</li>
<li><strong>Objective:</strong> The attacker achieves their final objective, such as data exfiltration, service disruption, or deployment of ransomware across the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33826 could lead to complete compromise of the Active Directory domain. This could result in widespread data breaches, service outages, and significant financial losses. The vulnerability affects any organization relying on Windows Active Directory for authentication and authorization, making it a high-impact threat. The number of potential victims is vast, spanning across various sectors including government, finance, healthcare, and technology.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft for CVE-2026-33826 as soon as possible to remediate the underlying vulnerability (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826)</a>.</li>
<li>Monitor Active Directory servers for suspicious network connections originating from adjacent networks that may indicate exploitation attempts.</li>
<li>Implement stricter input validation controls within Active Directory environments to prevent similar vulnerabilities in the future.</li>
<li>Monitor event logs on Active Directory servers for unexpected process creation or code execution events that may be related to this vulnerability.</li>
<li>Implement the provided Sigma rule to detect suspicious process creations related to potential exploitation attempts on Active Directory servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33826</category><category>active-directory</category><category>code-execution</category><category>vulnerability</category></item><item><title>Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</link><pubDate>Mon, 30 Mar 2026 10:27:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</guid><description>Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute within Active Directory via PowerShell scripts. This activity is flagged as potentially malicious because it could be indicative of an attempt to exploit the &lsquo;BadSuccessor&rsquo; privilege escalation vulnerability in Windows Server 2025. The vulnerability, as outlined in Akamai&rsquo;s research, allows attackers to manipulate managed service account (dMSA) links to gain elevated privileges. The detection is based on identifying specific PowerShell script patterns that include <code>.Put(&quot;msDS-ManagedAccountPrecededByLink'</code> and <code>CN=</code>, which are used to modify these critical AD attributes. Defenders should be aware that legitimate administrative tasks might also trigger this detection, so careful tuning and validation are necessary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a system with sufficient privileges to execute PowerShell scripts, possibly through compromised credentials or other initial access vectors (T1078.002).</li>
<li><strong>Discovery:</strong> The attacker uses PowerShell to enumerate existing dMSAs and their associated <code>msDS-ManagedAccountPrecededByLink</code> attributes.</li>
<li><strong>Attribute Modification:</strong> The attacker crafts a PowerShell script to modify the <code>msDS-ManagedAccountPrecededByLink</code> attribute of a target dMSA. This involves using the <code>.Put(&quot;msDS-ManagedAccountPrecededByLink&quot;</code> command and specifying a new distinguished name (<code>CN=</code>) for the preceding account.</li>
<li><strong>Persistence:</strong> The attacker leverages the modified dMSA link to establish a persistent foothold in the environment by gaining control over the targeted dMSA.</li>
<li><strong>Privilege Escalation:</strong> By manipulating the dMSA links, the attacker effectively inherits the permissions and privileges associated with the compromised dMSA, thereby escalating their own privileges.</li>
<li><strong>Defense Evasion:</strong> The attacker may attempt to evade detection by obfuscating the PowerShell script or using other techniques to hide their activity.</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker can move laterally within the network, accessing sensitive resources and systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability through modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute can lead to complete domain compromise. An attacker can gain control over critical services and data, potentially resulting in data breaches, service disruptions, and significant financial losses. The impact is amplified in environments heavily reliant on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect potentially malicious modifications to dMSA link attributes via PowerShell (logsource: ps_script, product: windows).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if the activity is legitimate or indicative of an attempted exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability.</li>
<li>Implement strict access controls and monitoring for systems and accounts with the ability to modify Active Directory attributes.</li>
<li>Review and harden Active Directory security configurations to prevent unauthorized modification of sensitive attributes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>initial-access</category><category>active-directory</category></item><item><title>Active Directory Group Modification by SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</link><pubDate>Sat, 02 Nov 2024 23:59:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</guid><description>Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.</description><content:encoded><![CDATA[<p>This detection identifies a user being added to an Active Directory (AD) group by the SYSTEM account (S-1-5-18). This behavior is significant because it can indicate an attacker who has successfully achieved SYSTEM level privileges on a domain controller. Attackers typically obtain SYSTEM privileges by exploiting vulnerabilities in the domain controller, or by abusing default group privileges such as those assigned to Server Operators. Once SYSTEM access is achieved, the attacker can then attempt to pivot to a domain account. This allows them to gain persistent access and control over the AD environment. Successful exploitation enables attackers to perform actions with the privileges of the compromised account, leading to potential data breaches, system compromise, and further lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the network through various means, such as phishing or exploiting a public-facing application.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability or misconfiguration on a system within the network to achieve local administrator or SYSTEM privileges.</li>
<li><strong>Domain Controller Compromise:</strong> The attacker uses their elevated privileges to target a domain controller, exploiting vulnerabilities or weak configurations to gain SYSTEM access on the domain controller itself.</li>
<li><strong>Group Modification:</strong> Once the attacker has SYSTEM privileges on a domain controller, they use this access to add a user account to a privileged Active Directory group. This is done by modifying the group membership using tools native to the operating system.</li>
<li><strong>Persistence:</strong> By adding a user account to a privileged group, the attacker ensures they have persistent access to the domain, even if their initial access method is discovered and blocked.</li>
<li><strong>Lateral Movement:</strong> With the newly acquired group membership, the attacker can now move laterally within the network, accessing resources and systems that were previously inaccessible.</li>
<li><strong>Data Exfiltration / Impact:</strong> The attacker leverages their access to locate and exfiltrate sensitive data, or to disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a wide range of negative consequences, including data breaches, system compromise, and disruption of critical business operations. Attackers can use the compromised account to access sensitive data, modify system configurations, or even deploy ransomware. The scope of impact depends on the permissions and privileges associated with the compromised account and the targeted resources. Furthermore, the incident can damage the organization&rsquo;s reputation and result in regulatory fines and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; to generate the necessary events for detection as detailed in the <a href="https://ela.st/audit-security-group-management">setup instructions</a>.</li>
<li>Deploy the following Sigma rule to detect potential Active Directory group modifications by the SYSTEM account and tune for your environment.</li>
<li>Investigate any event with event code 4728 where the SubjectUserSid is &ldquo;S-1-5-18&rdquo; as described in the <a href="#overview">overview</a>.</li>
<li>Review the investigation guide outlined in the rule description for triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>windows</category><category>active directory</category></item><item><title>Suspicious DNS-Named Record Creation in Active Directory Integrated DNS</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</link><pubDate>Wed, 22 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</guid><description>Detection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) is a core component of AD DS, storing DNS zones as AD objects. The default permission settings allow any authenticated user to create DNS-named records. This creates an opportunity for attackers to perform Dynamic Spoofing attacks by monitoring LLMNR/NBT-NS requests and creating DNS-named records to target systems or specific services like WPAD. This attack can enable credential access by redirecting traffic through attacker-controlled systems, leading to the capture of sensitive information. This activity is detectable by monitoring Windows event code 5137 related to DNS record creation and filtering out legitimate system accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a domain-joined system, possibly through compromised credentials or phishing.</li>
<li>The attacker passively monitors LLMNR/NBT-NS broadcast traffic to identify systems being requested on the network.</li>
<li>Upon observing a request for a target system (e.g., WPAD), the attacker creates a DNS-named record in ADIDNS that resolves the target system&rsquo;s name to an attacker-controlled IP address. This leverages the default permissions in ADIDNS that allow authenticated users to create DNS records.</li>
<li>When a legitimate user attempts to access the target system, the DNS query resolves to the attacker&rsquo;s IP address.</li>
<li>The user&rsquo;s traffic is redirected to the attacker&rsquo;s system.</li>
<li>The attacker intercepts the user&rsquo;s credentials or other sensitive information.</li>
<li>The attacker may relay captured credentials to other systems on the network.</li>
<li>The attacker achieves credential access and lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain unauthorized access to sensitive systems and data within the Active Directory domain. While the severity is low, it can be a stepping stone to further, more damaging attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (event code 5137) for detection.</li>
<li>Deploy the Sigma rule <code>Creation of a DNS-Named Record</code> to detect suspicious DNS record creation events.</li>
<li>Implement stricter access controls on DNS record creation within Active Directory to limit permissions to only necessary and trusted accounts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>active-directory</category></item><item><title>Potential ADIDNS Poisoning via Wildcard Record Creation</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</link><pubDate>Fri, 03 May 2024 14:58:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</guid><description>Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) stores DNS zones as Active Directory objects, which, while providing access control and replication benefits, introduces security issues. A significant concern is the creation of wildcard records due to the default permission allowing any authenticated user to create DNS-named records. By exploiting this, attackers can establish wildcard records to redirect traffic for domain names lacking explicit DNS records, effectively positioning themselves as an adversary-in-the-middle. This manipulation of ADIDNS can lead to credential interception or relay attacks, similar to LLMNR/NBNS spoofing. This poses a high risk to organizations relying on ADIDNS for domain consistency and secure name resolution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the domain.</li>
<li>Attacker leverages existing privileges to create a wildcard DNS record (A record) within an ADIDNS zone.</li>
<li>The wildcard record is created with a DN like <code>DC=*,DC=example.com,CN=MicrosoftDNS,DC=DomainDnsZones,DC=example,DC=com</code>, where <code>DC=*</code> signifies the wildcard. Event ID 5137 is generated.</li>
<li>The wildcard record points to a malicious server controlled by the attacker.</li>
<li>A client attempts to resolve a domain name that does not have an explicit DNS record.</li>
<li>Due to the wildcard record, the DNS query resolves to the attacker&rsquo;s malicious server.</li>
<li>The client connects to the attacker&rsquo;s server, potentially exposing credentials or other sensitive information.</li>
<li>The attacker intercepts or relays the client&rsquo;s traffic, gaining unauthorized access or control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain control over systems within the affected domain. The impact includes unauthorized access to sensitive data, lateral movement within the network, and potential compromise of critical domain services. This can affect any organization using Active Directory Integrated DNS, leading to widespread disruption and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (5137) for detecting ADIDNS wildcard record creation as described in the <a href="https://ela.st/audit-directory-service-changes">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Potential ADIDNS Poisoning via Wildcard Record Creation&rdquo; to detect the creation of wildcard DNS records in ADIDNS based on Windows Event ID 5137.</li>
<li>Review and restrict ADIDNS permissions for DNS zones to limit wildcard-creation opportunities, focusing on authenticated-user create-child rights.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on <code>winlog.event_data.ObjectDN</code>, <code>user.name</code>, and the originating session as outlined in the rule&rsquo;s <code>note</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>adidns</category><category>windows</category><category>active-directory</category></item><item><title>Potential Enumeration via Active Directory Web Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</guid><description>Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.</description><content:encoded><![CDATA[<p>The Active Directory Web Service (ADWS) facilitates querying Active Directory (AD) over a network, providing a web-based interface for directory services. Adversaries may exploit ADWS to enumerate network resources and user accounts, gaining insights into the environment. This attack involves loading Active Directory related modules and establishing network connections to the ADWS dedicated TCP port 9389. The goal is to gather information about the domain, user accounts, and permissions, which can be used for lateral movement, privilege escalation, and data exfiltration. Detection focuses on identifying suspicious processes loading <code>System.DirectoryServices*.dll</code> or <code>System.IdentityModel*.dll</code> and then connecting to the ADWS port.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target network.</li>
<li>The attacker executes a reconnaissance tool or script (e.g., PowerShell) on the compromised host.</li>
<li>The reconnaissance tool loads Active Directory related modules such as <code>System.DirectoryServices*.dll</code> and <code>System.IdentityModel*.dll</code>.</li>
<li>The reconnaissance tool attempts to establish a network connection to the ADWS service on TCP port 9389, the dedicated port for ADWS.</li>
<li>The tool queries ADWS to retrieve information about domain users (T1087.002), groups (T1069.002), systems (T1018), and permissions.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts and potential targets for lateral movement.</li>
<li>The attacker uses the discovered information to move laterally within the network.</li>
<li>The attacker escalates privileges, and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain detailed knowledge of the Active Directory environment. This information can be used to identify high-value targets, compromise privileged accounts, move laterally within the network, and ultimately achieve their objectives, which could include data theft, ransomware deployment, or disruption of services. The impact can range from data breaches to complete compromise of the Active Directory domain, depending on the attacker&rsquo;s goals and the level of access they achieve.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Suspicious Library Loading&rdquo; to detect processes loading AD-related DLLs (e.g., <code>System.DirectoryServices*.dll</code>, <code>System.IdentityModel*.dll</code>).</li>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Network Connection&rdquo; to monitor for network connections to destination port 9389 from unusual processes.</li>
<li>Review and whitelist legitimate administrative tools or scripts that load Active Directory-related modules and connect to the ADWS port as described in the &ldquo;False positive analysis&rdquo; section of the original rule documentation.</li>
<li>Implement network segmentation to limit access to the ADWS port (9389) to only trusted systems and users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>enumeration</category><category>adws</category><category>discovery</category><category>windows</category></item><item><title>Kerberos Pre-authentication Disabled for User Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</guid><description>Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Kerberos pre-authentication requirement is disabled for a user account within an Active Directory environment. Attackers with <code>GenericWrite</code> or <code>GenericAll</code> permissions over a target account can modify the <code>UserAccountControl</code> attribute to disable pre-authentication. This configuration weakens the account&rsquo;s security posture, making it vulnerable to AS-REP roasting attacks, where attackers can request Kerberos tickets and crack the password offline. The activity is logged as Event ID 4738 in the Windows Security Event Logs, specifically when the <code>NewUACList</code> includes the <code>USER_DONT_REQUIRE_PREAUTH</code> flag. This poses a significant risk, especially if applied to privileged accounts, as it allows adversaries to potentially compromise credentials and escalate privileges within the domain. The detection is based on research and recommendations from Microsoft regarding Kerberos security best practices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an account with sufficient privileges (e.g., Domain Admin, or an account with delegated permissions) to modify user account attributes in Active Directory.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages their initial access to target a specific user account for which they intend to disable Kerberos pre-authentication.</li>
<li><strong>Account Modification:</strong> The attacker modifies the <code>UserAccountControl</code> attribute of the target user account, specifically disabling the &ldquo;Do not require pre-authentication&rdquo; setting (setting the <code>USER_DONT_REQUIRE_PREAUTH</code> flag). This is often done using tools like <code>Active Directory Users and Computers</code> or PowerShell cmdlets.</li>
<li><strong>Event Logging:</strong> The modification triggers a Windows Security Event Log event (Event ID 4738) on the Domain Controller, indicating that the user account attribute has been changed. The <code>NewUACList</code> field in the event data contains <code>USER_DONT_REQUIRE_PREAUTH</code>.</li>
<li><strong>AS-REQ Request:</strong> The attacker crafts an AS-REQ (Authentication Service Request) to the Kerberos Key Distribution Center (KDC) for the targeted user account. Since pre-authentication is disabled, the KDC processes the request without requiring pre-authentication.</li>
<li><strong>AS-REP Response:</strong> The KDC issues an AS-REP (Authentication Service Response) to the attacker, containing an encrypted Ticket Granting Ticket (TGT) for the targeted user account.</li>
<li><strong>Offline Cracking:</strong> The attacker extracts the encrypted TGT from the AS-REP response and attempts to crack it offline using password cracking tools and techniques, such as hashcat or John the Ripper.</li>
<li><strong>Credential Access:</strong> Upon successfully cracking the TGT, the attacker obtains the plaintext password for the targeted user account. This password can then be used for lateral movement, privilege escalation, and further malicious activities within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising user accounts through AS-REP roasting can have significant consequences. Attackers can gain unauthorized access to sensitive resources, escalate privileges, and move laterally within the network. Successful AS-REP roasting leads to credential compromise, which could result in data breaches, system compromise, and disruption of services. Organizations failing to monitor and prevent Kerberos pre-authentication disabling are at an increased risk of credential theft and subsequent exploitation, potentially affecting all systems within the compromised domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit User Account Management&rdquo; and ensure Windows Security Event Logs (specifically Event ID 4738) are being collected and forwarded to your SIEM for analysis as described in the setup instructions linked in the rule source.</li>
<li>Deploy the provided Sigma rule to detect Event ID 4738 events where the <code>NewUACList</code> contains <code>USER_DONT_REQUIRE_PREAUTH</code> within your environment to identify potential AS-REP roasting vulnerabilities.</li>
<li>Investigate any instances of disabled pre-authentication, especially on privileged accounts, following the triage steps outlined in the rule documentation.</li>
<li>Enforce the principle of least privilege by reviewing and restricting the privileges assigned to users and groups to prevent unauthorized modification of Active Directory user account attributes.</li>
<li>Monitor for suspicious Kerberos authentication patterns and investigate any anomalies that might indicate AS-REP roasting attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberos</category><category>credential-access</category><category>as-rep-roasting</category><category>active-directory</category><category>windows</category></item><item><title>Active Directory msPKIAccountCredentials Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-cred-roaming/</link><pubDate>Fri, 26 Jan 2024 18:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cred-roaming/</guid><description>Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.</description><content:encoded><![CDATA[<p>The msPKIAccountCredentials attribute in Active Directory stores encrypted credential data, including private keys and certificates. An attacker can modify this attribute to escalate privileges by overwriting an arbitrary file. This is achieved by modifying the msPKIAccountCredentials attribute of a user object with malicious credential objects. Successful exploitation allows the attacker to gain elevated privileges within the domain. The attack leverages the Windows credential roaming feature to inject these malicious credentials. This activity is detected via event code 5136 in the Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a domain-joined system, possibly through compromised credentials or phishing.</li>
<li>The attacker identifies a target Active Directory user account to manipulate.</li>
<li>The attacker crafts a malicious payload containing an encrypted credential object.</li>
<li>The attacker uses a tool or script (e.g., PowerShell, adsiedit.msc) to modify the target user&rsquo;s msPKIAccountCredentials attribute in Active Directory.</li>
<li>The attacker triggers credential roaming, causing the modified attribute to be propagated to other domain-joined systems where the target user logs in.</li>
<li>When the target user logs in, the malicious credential object is processed, potentially overwriting a critical system file.</li>
<li>The attacker leverages the overwritten file to execute arbitrary code with elevated privileges.</li>
<li>The attacker achieves privilege escalation and gains further access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the msPKIAccountCredentials attribute can lead to complete domain compromise. Attackers can gain control over critical systems and data within the Active Directory environment. While the exact number of potential victims is unknown, any organization utilizing Active Directory is potentially vulnerable. This attack allows for lateral movement, data exfiltration, and potentially the deployment of ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary event logs (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule <code>Modification of msPKIAccountCredentials in Active Directory</code> to detect suspicious modifications of the attribute.</li>
<li>Review and harden Active Directory access controls, limiting which accounts can modify the <code>msPKIAccountCredentials</code> attribute.</li>
<li>Monitor event code 5136 in the Windows Security Event Logs for modifications to the <code>msPKIAccountCredentials</code> attribute.</li>
<li>Create exceptions in your SIEM for authorized administrative accounts that legitimately modify this attribute to reduce false positives as described in the &ldquo;False positive analysis&rdquo; section above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>credential-roaming</category><category>active-directory</category><category>windows</category></item><item><title>First Time Seen Account Performing DCSync</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</guid><description>Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.</description><content:encoded><![CDATA[<p>The DCSync attack is a technique used to retrieve credential information from Active Directory, potentially leading to complete domain compromise. This attack involves initiating the Active Directory replication process, which is normally reserved for domain controllers. This detection identifies user accounts initiating this process for the first time, which can be an indicator of malicious activity. This activity is detected via Windows Security Event Logs and focuses on the identification of the initial use of replication protocols. Attackers exploit this to steal credentials or sensitive data stored within the Active Directory. This technique can be used to escalate privileges and move laterally within the network, eventually leading to data exfiltration or other malicious objectives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network.</li>
<li>The attacker escalates privileges to obtain the necessary rights to perform DCSync. This may involve exploiting vulnerabilities or using stolen credentials.</li>
<li>The attacker uses a tool like Mimikatz or custom scripts to initiate the Active Directory replication process.</li>
<li>The tool requests replication of directory data, specifically targeting credential information. This involves using the <code>DS-Replication-Get-Changes</code> or similar replication-right GUIDs.</li>
<li>The Active Directory server responds by providing the requested data, which includes password hashes and other sensitive information.</li>
<li>The attacker extracts the credential information from the replicated data.</li>
<li>The attacker uses the extracted credentials to move laterally within the network and access other systems or data.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or long-term persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DCSync attack can lead to the compromise of the entire Active Directory domain. This can result in widespread data breaches, loss of sensitive information, and significant disruption to business operations. Attackers can gain access to critical systems and data, potentially leading to financial losses, reputational damage, and legal liabilities. The number of potential victims is dependent on the size of the compromised Active Directory environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to generate the necessary Windows Security Event Logs (event code 4662) as described in the <a href="https://ela.st/audit-directory-service-access">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect First Time DCSync Activity&rdquo; to your SIEM and tune for your environment to identify suspicious DCSync behavior.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>SubjectUserSid</code>, <code>SubjectUserName</code>, <code>Properties</code>, <code>AccessMask</code>, and <code>computer_name</code> fields in the Windows Security Event Logs.</li>
<li>Monitor for changes to Active Directory object permissions (5136 events) that could grant unauthorized users DCSync capabilities as outlined in the triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>windows</category><category>active-directory</category></item><item><title>SeEnableDelegationPrivilege Assignment Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</link><pubDate>Wed, 03 Jan 2024 17:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</guid><description>Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.</description><content:encoded><![CDATA[<p>The SeEnableDelegationPrivilege user right, when assigned to a security principal, allows that principal to be trusted for delegation within Active Directory. Attackers can abuse this right to compromise accounts and elevate privileges by impersonating other users or services. This technique can be used for lateral movement, persistence, and ultimately, domain dominance. Defenders should monitor for the assignment of this privilege, especially to accounts that should not have it. The targeted behavior is logged as event ID 4704 in Windows Security logs. This activity is critical to monitor as it represents a powerful tool for attackers to move laterally and maintain persistence within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised account with sufficient privileges to modify user rights.</li>
<li>The attacker assigns the SeEnableDelegationPrivilege to a target account using tools like <code>ntrights.exe</code> or PowerShell cmdlets.</li>
<li>Windows Security Event 4704 is generated, logging the privilege assignment.</li>
<li>The attacker modifies the target account&rsquo;s attributes, such as <code>userAccountControl</code> or <code>msDS-AllowedToDelegateTo</code>, to enable delegation.</li>
<li>The attacker leverages Kerberos delegation to impersonate other users or services.</li>
<li>Using the impersonated credentials, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>The attacker moves laterally within the network, compromising additional systems and accounts.</li>
<li>The attacker achieves their final objective, such as data exfiltration or domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise Active Directory accounts and elevate privileges, potentially leading to full control over the domain. The impact includes unauthorized access to sensitive data, lateral movement to critical systems, and the potential for long-term persistence. Depending on the compromised accounts, the entire organization can be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Authorization Policy Change&rdquo; to generate Windows Security Event ID 4704 (Setup instructions: <a href="https://ela.st/audit-authorization-policy-change)">https://ela.st/audit-authorization-policy-change)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Sensitive Privilege SeEnableDelegationPrivilege assigned to a Principal&rdquo; to your SIEM to detect the assignment of this privilege.</li>
<li>Investigate any instances where SeEnableDelegationPrivilege is assigned, focusing on the targeted account and the source of the change.</li>
<li>Monitor for modifications to delegation-related attributes on user and computer objects.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>windows</category><category>active-directory</category></item><item><title>Detection of NetExec Hacktool Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-netexec-execution/</link><pubDate>Wed, 03 Jan 2024 14:35:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netexec-execution/</guid><description>The threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.</description><content:encoded><![CDATA[<p>NetExec, previously known as CrackMapExec, is a post-exploitation tool commonly used during Active Directory penetration testing. It is also favored by red teams and malicious actors for reconnaissance, lateral movement, and credential harvesting within Windows networks. This tool allows for the enumeration of hosts, exploitation of network services, and remote command execution. The use of NetExec in an enterprise environment is considered suspicious due to its capabilities for identifying vulnerable systems and facilitating unauthorized access. Defenders should monitor for its execution, as it is often a precursor to more serious attacks, including ransomware deployment, such as the Lynx ransomware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via an exploit or compromised credentials.</li>
<li>NetExec (nxc.exe) is deployed on the compromised host, often copied to a temporary directory.</li>
<li>NetExec is executed with commands to enumerate network shares and identify potential targets using SMB.</li>
<li>The tool uses LDAP to query Active Directory for user accounts, groups, and organizational units.</li>
<li>NetExec attempts to authenticate to other systems using gathered or compromised credentials via protocols such as SMB, SSH, or RDP.</li>
<li>Successful authentication allows for remote command execution via WMI or WinRM.</li>
<li>The attacker leverages identified vulnerabilities or misconfigurations to escalate privileges on the target systems.</li>
<li>The attacker moves laterally through the network, gaining access to sensitive data or deploying ransomware like Lynx.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of NetExec can lead to widespread compromise within an Active Directory environment. Attackers can identify and exploit vulnerable systems, harvest credentials, and move laterally to gain access to critical assets. This can result in data theft, system disruption, and ransomware deployment, potentially affecting hundreds or thousands of systems depending on the size of the organization. The tool is often used as a precursor to ransomware attacks, where entire networks can be encrypted, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>HackTool - NetExec Execution</code> to your SIEM to detect the execution of NetExec based on process creation logs.</li>
<li>Monitor process creation events for <code>nxc.exe</code> with command-line arguments associated with network protocols like <code>ftp</code>, <code>ldap</code>, <code>mssql</code>, <code>nfs</code>, <code>rdp</code>, <code>smb</code>, <code>ssh</code>, <code>vnc</code>, <code>winrm</code>, and <code>wmi</code>.</li>
<li>Implement strict access controls and regularly audit Active Directory to minimize the potential for lateral movement.</li>
<li>Consider using application control solutions to prevent the execution of unauthorized tools like <code>nxc.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pentest</category><category>post-exploitation</category><category>lateral-movement</category><category>active-directory</category></item><item><title>Active Directory Discovery via ADExplorer Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</guid><description>Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.</description><content:encoded><![CDATA[<p>ADExplorer is an advanced Active Directory (AD) viewer and editor, it includes the ability to save snapshots of an AD database for offline viewing and comparisons. Adversaries may abuse this utility to perform domain reconnaissance, gather sensitive information about the AD structure, user accounts, and group memberships. The execution of ADExplorer is a potential indicator of malicious activity, especially when observed in environments where its use is not typical or when executed by unauthorized users. This activity can lead to further exploitation, such as privilege escalation and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker downloads the ADExplorer utility (ADExplorer.exe) to the compromised host.</li>
<li>The attacker executes ADExplorer.exe to begin enumeration of the Active Directory environment.</li>
<li>ADExplorer interacts with the Active Directory domain controllers, querying information about users, groups, computers, and organizational units.</li>
<li>The attacker may use ADExplorer to save snapshots of the AD database for offline analysis.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts, critical assets, and potential vulnerabilities within the AD environment.</li>
<li>The attacker uses the discovered information to plan further attacks, such as lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of ADExplorer by malicious actors can lead to the discovery of sensitive information about the Active Directory environment. This information can be leveraged to facilitate lateral movement, privilege escalation, and data exfiltration. While the initial risk score is low, the reconnaissance activity enables follow-on attacks that can have severe consequences, potentially leading to full domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Process Name</code> to detect the execution of ADExplorer based on process name.</li>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Original File Name</code> to detect the execution of ADExplorer based on the process&rsquo;s original file name.</li>
<li>Monitor process creation events on Windows endpoints for the execution of ADExplorer.exe or processes with an original file name of &ldquo;AdExp&rdquo; to detect potential reconnaissance activities.</li>
<li>Investigate and validate any execution of ADExplorer by non-administrator accounts.</li>
<li>Review ADExplorer use and restrict its usage to authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active-directory</category><category>discovery</category><category>reconnaissance</category><category>windows</category></item><item><title>Potential Credential Access via DCSync</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-dcsync-replication/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-dcsync-replication/</guid><description>This rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.</description><content:encoded><![CDATA[<p>The DCSync attack is a technique that allows an attacker to use the Windows Domain Controller&rsquo;s API to simulate the replication process from a remote domain controller. This enables the attacker to compromise critical credential material, such as Kerberos krbtgt keys, which can then be used for ticket creation and forgery. This attack requires specific privileges (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All), typically granted to members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups. This rule focuses on detecting the initiation of the Active Directory replication process by user accounts, which could indicate a DCSync attack. The rule specifically monitors for Event ID 4662, filtering out computer accounts and Azure AD Connect MSOL accounts to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with a privileged account (e.g., Domain Admin).</li>
<li>The attacker uses the privileged account to grant an attacker-controlled object the right to DCsync/Replicate.</li>
<li>The attacker initiates an Active Directory replication process using the granted rights.</li>
<li>Windows generates Event ID 4662 (Operation was performed on an Active Directory object) with Access Mask 0x100 (Control Access).</li>
<li>The event properties include DS-Replication-Get-Changes or DS-Replication-Get-Changes-All or DS-Replication-Get-Changes-In-Filtered-Set.</li>
<li>The attacker extracts sensitive information such as password hashes.</li>
<li>The attacker forges Kerberos tickets using the compromised credentials.</li>
<li>The attacker achieves domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DCSync attack can lead to the compromise of the entire Active Directory domain. Attackers can steal credential information, including the krbtgt key, allowing them to forge Kerberos tickets and gain unauthorized access to any resource within the domain. This can lead to data breaches, system outages, and significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to generate the required event logs (Event ID 4662) for detection, as indicated in the <a href="https://ela.st/audit-directory-service-access">setup instructions</a>.</li>
<li>Deploy the provided Sigma rule <code>Detect Potential DCSync Activity</code> to identify suspicious Active Directory replication events in your SIEM.</li>
<li>Investigate any alerts generated by the Sigma rule by correlating security events 4662 and 4624 by Logon ID on the Domain Controller.</li>
<li>Review and restrict the privileges granted to accounts with DS-Replication-Get-Changes and DS-Replication-Get-Changes-All rights.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>windows</category><category>active-directory</category></item><item><title>AdFind Tool Used for Active Directory Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</guid><description>The execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.</description><content:encoded><![CDATA[<p>AdFind is a command-line tool used to retrieve information from Active Directory. While it has legitimate uses for network administrators, threat actors frequently leverage it for post-exploitation Active Directory reconnaissance. The tool allows for quick scoping of AD person/computer objects and understanding subnets and domain information. AdFind has been observed in campaigns associated with various threat actors, including Trickbot, Ryuk, Maze, and FIN6. This reconnaissance activity is typically conducted after initial compromise to gather information for lateral movement and privilege escalation. The detection of AdFind execution, especially with specific command-line arguments, can indicate malicious activity within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows host, possibly through exploitation of a vulnerability or compromised credentials.</li>
<li>Tool Transfer: The attacker transfers AdFind.exe to the compromised host.</li>
<li>Execution: The attacker executes AdFind.exe from the command line or via a script.</li>
<li>Discovery: AdFind is used to enumerate Active Directory objects such as computers (<code>objectcategory=computer</code>), users (<code>objectcategory=person</code>), subnets (<code>objectcategory=subnet</code>), and groups (<code>objectcategory=group</code>).</li>
<li>Information Gathering: The attacker gathers information about domain controllers using commands such as <code>dclist</code> or <code>dcmodes</code>.</li>
<li>Privilege Escalation: The gathered information is used to identify potential targets for privilege escalation, such as accounts with weak passwords or misconfigured permissions.</li>
<li>Lateral Movement: The attacker uses the gathered information to move laterally to other systems within the network.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance using AdFind can provide attackers with a comprehensive understanding of the Active Directory environment, facilitating lateral movement, privilege escalation, and ultimately, the exfiltration of sensitive data or deployment of ransomware. While the use of AdFind itself may not be directly damaging, it is a strong indicator of malicious activity within a compromised network. The impact can range from data breaches and financial losses to reputational damage and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AdFind Command Activity&rdquo; to your SIEM to detect the execution of AdFind with suspicious command-line arguments.</li>
<li>Enable Sysmon process-creation logging to provide the necessary data for the Sigma rule to function effectively (reference the Sysmon setup documentation).</li>
<li>Investigate any alerts generated by the &ldquo;AdFind Command Activity&rdquo; Sigma rule to determine the scope and impact of the potential compromise.</li>
<li>Monitor process execution events for AdFind-related activity, focusing on command-line arguments used to query Active Directory objects (reference the <code>query</code> field in the original rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following a successful compromise.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>adfind</category><category>active-directory</category><category>reconnaissance</category><category>windows</category></item></channel></rss>