<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Active_directory — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/active_directory/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/active_directory/feed.xml" rel="self" type="application/rss+xml"/><item><title>User Added to Privileged Group in Active Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</guid><description>Adversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.</description><content:encoded><![CDATA[<p>Attackers often target Active Directory (AD) to gain control over a network. Adding a user account to a highly privileged group, such as Domain Admins or Enterprise Admins, is a common tactic for establishing persistence and escalating privileges. By compromising an account with the ability to manage group memberships or exploiting vulnerabilities, an attacker can add their own rogue account to a privileged group, granting them extensive control over the AD domain. This activity might go unnoticed amidst legitimate administrative actions, making it a stealthy method of maintaining unauthorized access. This is a common technique employed after initial compromise to ensure long-term access to critical systems and data. Detecting such additions requires careful monitoring of AD security logs for specific events related to group membership changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a low-privileged user account through phishing or credential theft.</li>
<li>Lateral movement to a system with access to Active Directory management tools.</li>
<li>Privilege escalation to an account with permissions to modify group memberships (e.g., leveraging exploits or credential dumping).</li>
<li>Use of AD management tools (e.g., Active Directory Users and Computers, PowerShell with AD module) to add the attacker-controlled user account to a privileged group, such as Domain Admins (RID 512).</li>
<li>The attacker logs in with the newly privileged account.</li>
<li>The attacker uses their elevated privileges to access sensitive data, install backdoors, or perform other malicious activities.</li>
<li>The attacker may attempt to remove the initially compromised account to remove traces of their activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of an attacker-controlled user to a privileged AD group grants them near-total control over the domain. This can lead to widespread data breaches, ransomware deployment across the entire network, compromise of sensitive systems, and long-term disruption of business operations. The impact can extend to all domain-joined systems and resources, potentially affecting thousands of users and devices. Remediation often requires a complete rebuild of the Active Directory environment, resulting in significant downtime and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; in Active Directory to generate the necessary security events for detecting group membership changes.</li>
<li>Deploy the Sigma rule &ldquo;User Added to Privileged Group in Active Directory&rdquo; to your SIEM to detect suspicious additions to privileged groups, tuning the rule for known administrative accounts.</li>
<li>Monitor for unexpected use of AD management tools, such as <code>Active Directory Users and Computers</code> or <code>PowerShell</code> with the <code>AD</code> module, especially from unusual source hosts.</li>
<li>Investigate any alerts generated by the Sigma rule by verifying the legitimacy of the user adding members to the group and validating the need for the new member to have those privileges.</li>
<li>Regularly review the membership of privileged groups and remove any unauthorized or unnecessary accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>active_directory</category></item><item><title>Suspicious Access to LDAP Attributes</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</guid><description>The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.</description><content:encoded><![CDATA[<p>This rule identifies read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information. The rule focuses on event code 4662, filtering for &lsquo;Read Property&rsquo; access where the number of properties accessed is greater than or equal to 2000. The rule is designed to detect potential reconnaissance activities within an Active Directory environment, providing security teams with insights into unusual access patterns that may indicate malicious intent. This detection logic helps security teams proactively identify and respond to potential threats targeting Active Directory environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the target network, possibly through compromised credentials or a phishing attack (not directly covered in the provided source).</li>
<li>The attacker uses the compromised account to query Active Directory via LDAP.</li>
<li>The attacker issues a series of LDAP queries, requesting a large number of attributes for various Active Directory objects, triggering event ID 4662.</li>
<li>The event logs record the excessive number of read property accesses (winlog.event_data.Properties), exceeding the threshold of 2000.</li>
<li>The attacker analyzes the gathered information to identify potential targets, such as privileged accounts, sensitive data stores, or vulnerable systems.</li>
<li>The attacker attempts to elevate privileges by exploiting identified vulnerabilities or misconfigurations within Active Directory.</li>
<li>The attacker uses the elevated privileges to access sensitive information or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gather sensitive information about the Active Directory environment, identify potential vulnerabilities, elevate privileges, and move laterally within the network. This can lead to data breaches, system compromise, and significant disruption to business operations. The number of victims and sectors targeted are dependent on the scope and objectives of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Access to generate the necessary events (event code 4662) as mentioned in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Access to LDAP Attributes&rdquo; to your SIEM and tune the threshold (length(winlog.event_data.Properties) &gt;= 2000) for your environment.</li>
<li>Review event logs for event code 4662, focusing on the <code>winlog.event_data.Properties</code> field, to understand which attributes were accessed.</li>
<li>Investigate the source machine from which the LDAP queries originated by examining the <code>winlog.event_data.SubjectUserSid</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active_directory</category><category>ldap</category><category>discovery</category><category>windows</category></item></channel></rss>