<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kerberos — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/kerberos/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 17:31:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/kerberos/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Kerberos SPN Spoofing via Suspicious DNS Query</title><link>https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</link><pubDate>Fri, 01 May 2026 17:31:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</guid><description>Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern in DNS queries indicative of Kerberos SPN spoofing, a technique used to coerce systems into authenticating to attacker-controlled hosts. The pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo; represents a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers exploit this by crafting malicious DNS names to trick victim systems into requesting Kerberos tickets for legitimate services, often their own identity, but directed towards an attacker-controlled endpoint. This can lead to Kerberos relay or NTLM reflection/relay attacks, bypassing normal NTLM fallback mechanisms. The technique is associated with tools like RemoteKrbRelay and wspcoerce. This activity has been observed in various attacks targeting Windows environments where Kerberos authentication is prevalent. Defenders need to detect and mitigate this early stage of credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target Windows system within the network.</li>
<li>The attacker sets up a malicious server to receive coerced authentication requests.</li>
<li>The attacker crafts a malicious DNS query containing a base64-encoded blob &ldquo;UWhRCA&hellip;BAAAA&rdquo; representing a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The victim system, triggered by an external factor (e.g., RPC call, scheduled task, or web request), attempts to resolve the crafted DNS name.</li>
<li>The malicious DNS query is sent to the DNS server, which resolves to the attacker&rsquo;s server.</li>
<li>The victim system initiates a Kerberos authentication request to the attacker&rsquo;s server, believing it to be a legitimate service.</li>
<li>The attacker&rsquo;s server relays the Kerberos ticket or uses NTLM reflection/relay techniques to gain unauthorized access.</li>
<li>The attacker compromises the victim system or pivots to other systems within the network using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential compromise, lateral movement, and domain takeover. Victims in Active Directory environments are particularly vulnerable. The impact includes unauthorized access to sensitive data, disruption of services, and potential ransomware deployment. If the coerced service has high privileges, the attacker can gain complete control over the compromised system or even the entire domain. Organizations using Kerberos authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Kerberos SPN Spoofing via Suspicious DNS Query&rdquo; rule to your SIEM and tune for your environment to detect malicious DNS queries.</li>
<li>Enable Sysmon Event ID 22 - DNS Query logging to provide the necessary data for detection.</li>
<li>Investigate and block any DNS queries resolving to external IPs that contain the &ldquo;UWhRCA&hellip;BAAAA&rdquo; pattern.</li>
<li>Monitor process creation events for processes initiating DNS queries containing the suspicious pattern, specifically looking for known coercion tools.</li>
<li>Implement network segmentation to limit the impact of lateral movement if a system is compromised.</li>
<li>Review and harden Kerberos configurations to prevent SPN spoofing and relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>spn-spoofing</category><category>dns</category><category>windows</category></item><item><title>Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kerberos-privesc/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kerberos-privesc/</guid><description>CVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.</description><content:encoded><![CDATA[<p>CVE-2026-27912 exposes an improper authorization flaw within the Windows Kerberos authentication protocol. This vulnerability allows an attacker who has already gained authorized access to an adjacent network to escalate their privileges. Successful exploitation of this vulnerability could lead to a complete compromise of the affected system. The vulnerability was reported to Microsoft and assigned CVE-2026-27912. Details regarding the specific Kerberos implementation flaws are still emerging, but the impact of successful exploitation is significant, potentially affecting all systems utilizing the flawed Kerberos implementation for authentication and authorization. This vulnerability highlights the importance of maintaining updated systems and promptly applying security patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an adjacent network, possibly through compromised credentials or other network vulnerabilities.</li>
<li>The attacker leverages valid credentials to authenticate to a Kerberos service within the Windows domain.</li>
<li>The attacker exploits the improper authorization vulnerability (CVE-2026-27912) in the Kerberos implementation.</li>
<li>The attacker requests a service ticket with modified or elevated privileges.</li>
<li>The Kerberos service improperly grants the ticket with elevated privileges due to the authorization flaw.</li>
<li>The attacker uses the forged Kerberos ticket to authenticate to other services or resources within the domain.</li>
<li>The attacker gains unauthorized access to sensitive data or performs administrative actions.</li>
<li>The attacker achieves privilege escalation and potentially compromises the entire domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27912 could allow an attacker to escalate privileges and gain unauthorized access to sensitive information. Given the nature of Kerberos as a central authentication service, this vulnerability has the potential to impact numerous systems within a domain. This could lead to data breaches, system compromise, and ultimately a complete loss of confidentiality, integrity, and availability of critical resources. The vulnerability has a CVSS v3.1 score of 8.0 (High).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Microsoft to address CVE-2026-27912 immediately on all Windows systems (reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912)</a>.</li>
<li>Monitor Kerberos authentication logs for suspicious ticket requests or anomalies following patch deployment. (Enable Kerberos auditing on domain controllers)</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts by monitoring for specific Kerberos events.</li>
<li>Implement network segmentation to limit the scope of potential damage from an adjacent network compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>kerberos</category><category>windows</category><category>cve-2026-27912</category></item><item><title>Kerberos Authentication Relay via DNS CNAME Abuse (CVE-2026-20929)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kerberos-relay-cname/</link><pubDate>Tue, 31 Mar 2026 17:49:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kerberos-relay-cname/</guid><description>An attacker exploits CVE-2026-20929 by manipulating DNS responses to redirect Kerberos authentication to attacker-controlled AD CS, enabling certificate enrollment for persistent access.</description><content:encoded><![CDATA[<p>CVE-2026-20929, a vulnerability patched in January 2026, allows attackers to perform Kerberos authentication relay attacks by abusing DNS CNAME records. The attack involves manipulating DNS resolution to redirect a client&rsquo;s Kerberos authentication request to an attacker-controlled server. This server then relays the authentication to Active Directory Certificate Services (AD CS) to enroll certificates on behalf of the victim user. This technique allows the attacker to gain persistent access to the domain. The vulnerability has a CVSS score of 7.5. This attack is a Kerberos-based variant of the ESC8 attack, which traditionally relies on NTLM relay. By exploiting Kerberos, the attack can bypass environments where NTLM has been disabled. The primary target is the AD CS web enrollment endpoint (/certsrv).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim attempts to access a web server (e.g., web01.test.local).</li>
<li>A DNS query is initiated to resolve the hostname of the target web server.</li>
<li>The attacker intercepts the DNS query and responds with a crafted DNS response containing a CNAME record that redirects the original hostname (web01.test.local) to an attacker-controlled target (e.g., CA01.test.local), along with an A record pointing to the attacker&rsquo;s IP address.</li>
<li>The victim&rsquo;s system accesses the attacker-controlled web server.</li>
<li>The malicious web server sends a 401 HTTP response to initiate Kerberos authentication.</li>
<li>The victim requests a Kerberos service ticket for HTTP/CA01.test.local from the domain controller.</li>
<li>The domain controller issues a service ticket for the requested SPN.</li>
<li>The attacker relays the Kerberos ticket to the AD CS web enrollment endpoint (/certsrv) to request a certificate for the victim user, thereby achieving persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20929 allows an attacker to enroll certificates on behalf of domain users, granting them persistent access to the network. Certificates are often valid for extended periods (1+ years) and are less frequently monitored than password-based authentication. This attack can bypass controls that disable NTLM authentication, and web enrollment over HTTP prevents Channel Binding Token (CBT) protection, making AD CS web enrollment an attractive relay target. The number of potential victims depends on the number of vulnerable AD CS deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for anomalous certificate-based authentication events combined with unusual AD CS service access within a short time window, as highlighted in the &ldquo;CrowdStrike has developed a correlation-based detection&rdquo; statement in the overview.</li>
<li>Disable web enrollment over HTTP to enforce Channel Binding Token (CBT) protection, mitigating the risk of successful relay attacks, as mentioned in the &ldquo;Why AD CS Web Enrollment Is an Attractive Relay Target&rdquo; section.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential exploitation attempts.</li>
<li>Review and harden AD CS configurations based on recommendations from &ldquo;Certified Pre-Owned&rdquo; research to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>kerberos</category><category>relay</category><category>adcs</category><category>cve-2026-20929</category><category>credential-access</category></item><item><title>MIT Kerberos Security Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-05-mit-kerberos-bypass/</link><pubDate>Tue, 24 Mar 2026 10:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-mit-kerberos-bypass/</guid><description>An anonymous, remote attacker can exploit a vulnerability in MIT Kerberos to bypass security measures.</description><content:encoded><![CDATA[<p>A vulnerability exists within MIT Kerberos that allows an unauthenticated, remote attacker to bypass security mechanisms. The specific nature of the vulnerability is not detailed in this advisory, but the potential impact is significant due to Kerberos&rsquo; central role in authentication and authorization. The advisory, published by the German BSI (Bundesamt für Sicherheit in der Informationstechnik), highlights the potential for attackers to gain unauthorized access or escalate privileges within a Kerberos-protected environment. Defenders should investigate available patches and mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable MIT Kerberos implementation.</li>
<li>The attacker crafts a malicious request to exploit the Kerberos vulnerability, likely targeting a specific service or protocol weakness.</li>
<li>The malicious request bypasses authentication or authorization checks due to the vulnerability.</li>
<li>The attacker gains unauthorized access to a Kerberos-protected resource or service.</li>
<li>Depending on the exploited vulnerability, the attacker may impersonate a legitimate user or service.</li>
<li>The attacker performs unauthorized actions, such as accessing sensitive data or executing commands.</li>
<li>The attacker escalates privileges within the Kerberos realm, potentially compromising the entire authentication infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to widespread unauthorized access and privilege escalation within Kerberos-dependent environments. The number of affected organizations is currently unknown, but the potential impact is significant due to the widespread use of Kerberos for authentication in enterprise networks. A successful attack could allow an attacker to compromise critical systems, steal sensitive data, and disrupt essential services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Kerberos authentication logs for anomalies indicative of exploitation attempts (see generic rule below).</li>
<li>Investigate and apply any available patches or workarounds released by MIT Kerberos to address the vulnerability.</li>
<li>Review and strengthen Kerberos configuration settings to minimize the attack surface.</li>
<li>Implement network segmentation to limit the impact of a potential Kerberos compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberos</category><category>authentication</category><category>security-bypass</category></item><item><title>Kerberos Pre-authentication Disabled for User Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</guid><description>Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Kerberos pre-authentication requirement is disabled for a user account within an Active Directory environment. Attackers with <code>GenericWrite</code> or <code>GenericAll</code> permissions over a target account can modify the <code>UserAccountControl</code> attribute to disable pre-authentication. This configuration weakens the account&rsquo;s security posture, making it vulnerable to AS-REP roasting attacks, where attackers can request Kerberos tickets and crack the password offline. The activity is logged as Event ID 4738 in the Windows Security Event Logs, specifically when the <code>NewUACList</code> includes the <code>USER_DONT_REQUIRE_PREAUTH</code> flag. This poses a significant risk, especially if applied to privileged accounts, as it allows adversaries to potentially compromise credentials and escalate privileges within the domain. The detection is based on research and recommendations from Microsoft regarding Kerberos security best practices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an account with sufficient privileges (e.g., Domain Admin, or an account with delegated permissions) to modify user account attributes in Active Directory.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages their initial access to target a specific user account for which they intend to disable Kerberos pre-authentication.</li>
<li><strong>Account Modification:</strong> The attacker modifies the <code>UserAccountControl</code> attribute of the target user account, specifically disabling the &ldquo;Do not require pre-authentication&rdquo; setting (setting the <code>USER_DONT_REQUIRE_PREAUTH</code> flag). This is often done using tools like <code>Active Directory Users and Computers</code> or PowerShell cmdlets.</li>
<li><strong>Event Logging:</strong> The modification triggers a Windows Security Event Log event (Event ID 4738) on the Domain Controller, indicating that the user account attribute has been changed. The <code>NewUACList</code> field in the event data contains <code>USER_DONT_REQUIRE_PREAUTH</code>.</li>
<li><strong>AS-REQ Request:</strong> The attacker crafts an AS-REQ (Authentication Service Request) to the Kerberos Key Distribution Center (KDC) for the targeted user account. Since pre-authentication is disabled, the KDC processes the request without requiring pre-authentication.</li>
<li><strong>AS-REP Response:</strong> The KDC issues an AS-REP (Authentication Service Response) to the attacker, containing an encrypted Ticket Granting Ticket (TGT) for the targeted user account.</li>
<li><strong>Offline Cracking:</strong> The attacker extracts the encrypted TGT from the AS-REP response and attempts to crack it offline using password cracking tools and techniques, such as hashcat or John the Ripper.</li>
<li><strong>Credential Access:</strong> Upon successfully cracking the TGT, the attacker obtains the plaintext password for the targeted user account. This password can then be used for lateral movement, privilege escalation, and further malicious activities within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising user accounts through AS-REP roasting can have significant consequences. Attackers can gain unauthorized access to sensitive resources, escalate privileges, and move laterally within the network. Successful AS-REP roasting leads to credential compromise, which could result in data breaches, system compromise, and disruption of services. Organizations failing to monitor and prevent Kerberos pre-authentication disabling are at an increased risk of credential theft and subsequent exploitation, potentially affecting all systems within the compromised domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit User Account Management&rdquo; and ensure Windows Security Event Logs (specifically Event ID 4738) are being collected and forwarded to your SIEM for analysis as described in the setup instructions linked in the rule source.</li>
<li>Deploy the provided Sigma rule to detect Event ID 4738 events where the <code>NewUACList</code> contains <code>USER_DONT_REQUIRE_PREAUTH</code> within your environment to identify potential AS-REP roasting vulnerabilities.</li>
<li>Investigate any instances of disabled pre-authentication, especially on privileged accounts, following the triage steps outlined in the rule documentation.</li>
<li>Enforce the principle of least privilege by reviewing and restricting the privileges assigned to users and groups to prevent unauthorized modification of Active Directory user account attributes.</li>
<li>Monitor for suspicious Kerberos authentication patterns and investigate any anomalies that might indicate AS-REP roasting attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberos</category><category>credential-access</category><category>as-rep-roasting</category><category>active-directory</category><category>windows</category></item><item><title>PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-powershell-kerberos-dump/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-powershell-kerberos-dump/</guid><description>Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting PowerShell scripts designed to extract Kerberos tickets from memory. Attackers use these scripts to gain unauthorized access to credentials, which can then be leveraged for lateral movement within a network. The scripts achieve this by interacting with the Local Security Authority (LSA) and accessing Kerberos authentication packages. The observed PowerShell scripts utilize specific Kerberos ticket message types or dynamic Kerberos package lookup to enumerate and retrieve tickets. This behavior is often associated with post-exploitation activity, where attackers are attempting to escalate privileges or move laterally within a compromised environment. Defenders should monitor PowerShell activity for these patterns, as successful Kerberos ticket dumping can lead to significant security breaches. The scripts are not associated with any specific campaign or version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a PowerShell script.</li>
<li>The PowerShell script uses <code>LsaCallAuthenticationPackage</code> to interact with the LSA.</li>
<li>The script attempts to retrieve Kerberos tickets by using functions like <code>KerbRetrieveEncodedTicketMessage</code>, <code>KerbQueryTicketCacheMessage</code>, <code>KerbQueryTicketCacheExMessage</code>, or <code>KerbRetrieveTicketMessage</code>.</li>
<li>Alternatively, the script uses <code>LsaLookupAuthenticationPackage</code> to dynamically locate the Kerberos package.</li>
<li>The script may then decrypt the ticket data using <code>KerbDecryptDataMessage</code>.</li>
<li>The script may attempt to serialize or export the extracted tickets to a file.</li>
<li>The attacker uses the dumped Kerberos tickets to impersonate users or services, gaining unauthorized access to resources and facilitating lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal Kerberos tickets from memory. The attacker can then use these tickets to impersonate legitimate users or services, enabling them to move laterally within the network, access sensitive data, and potentially compromise critical systems. The impact includes unauthorized access to resources, data breaches, and potentially a complete compromise of the targeted Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the malicious script content (as mentioned in the &ldquo;Setup&rdquo; section).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Kerberos Ticket Dump&rdquo; to detect scripts exhibiting Kerberos ticket dumping behavior.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the reconstructed script block content and process lineage as outlined in the &ldquo;Triage and analysis&rdquo; section.</li>
<li>Monitor for file creation events related to ticket material exports (e.g., &ldquo;.kirbi&rdquo; files) to identify potential ticket dumping activity.</li>
<li>Review authentication events (event codes 4624, 4625, 4648) to identify suspicious logins originating from compromised systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>powershell</category><category>windows</category></item><item><title>Potential Kerberos Coercion via DNS-Based SPN Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</guid><description>Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos coercion attempts via DNS-based SPN spoofing on Windows systems. The technique abuses MicrosoftDNS records, specifically looking for directory-service access or creation events (event codes 4662 and 5137) involving a MicrosoftDNS record that contains a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, a known indicator of DNS-based SPN spoofing used in Kerberos coercion tradecraft. The goal is to detect adversaries coercing victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services. This activity is typically observed within Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to a system with privileges to modify DNS records in Active Directory.</li>
<li>The attacker creates a new MicrosoftDNS record or modifies an existing one.</li>
<li>Within the DNS record, specifically in the <code>AdditionalInfo</code> or <code>ObjectDN</code> attributes, the attacker inserts a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob contains a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The attacker configures the DNS record to point to an attacker-controlled host. This involves manipulating the record&rsquo;s name and associated IP address.</li>
<li>The attacker triggers a victim system to resolve the manipulated DNS record, causing the victim to attempt Kerberos authentication with the attacker-controlled host, believing it to be a legitimate service.</li>
<li>The attacker intercepts the Kerberos authentication request.</li>
<li>The attacker relays the Kerberos ticket to a legitimate service, impersonating the victim system.</li>
<li>The attacker gains unauthorized access to the legitimate service using the relayed Kerberos ticket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberos coercion can grant attackers unauthorized access to critical systems and services within the Active Directory domain. This may lead to privilege escalation, lateral movement, data exfiltration, and other malicious activities. The scope of impact depends on the permissions and access rights of the coerced victim system and the targeted services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; and &ldquo;Audit Directory Service Changes&rdquo; Windows audit policies to ensure relevant events are logged (Setup section).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential Kerberos coercion attempts via DNS-based SPN spoofing. Tune the rules based on your environment and known legitimate activity.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the associated user accounts, systems, and modified DNS records (rule titles).</li>
<li>Restrict access to modify DNS records in Active Directory to only authorized personnel and systems to prevent unauthorized manipulation (Overview section).</li>
<li>Monitor Windows Security authentication events for any suspicious Kerberos activity following the modification of DNS records (Attack Chain steps 5-8).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>coercion</category><category>dns</category><category>spn</category><category>spoofing</category><category>credential-access</category></item><item><title>Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-relay-via-coerced-auth/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-relay-via-coerced-auth/</guid><description>Detects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos relay attacks targeting Windows systems. The attack involves coercing a target server to authenticate to an attacker-controlled system, which then relays the authentication to another service. The initial coercion leverages commonly abused named pipes like Spoolss, netdfs, and lsarpc. By capturing and relaying the Kerberos authentication, attackers can impersonate the target server and potentially execute code with elevated privileges. This activity is often associated with lateral movement and privilege escalation within a Windows domain. The detection focuses on the sequence of events, specifically a file access event (5145) against a named pipe, followed by a Kerberos authentication event (4624/4625) originating from a different IP address. Defenders should be aware that successful exploitation may lead to full domain compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a machine within the target network.</li>
<li>Attacker initiates a coerced authentication attempt against a target server, triggering a file access event (Event ID 5145) on the target. This leverages a named pipe such as Spoolss, netdfs, lsarpc, lsass, netlogon, samr, efsrpc, FssagentRpc, eventlog, winreg, srvsvc, dnsserver, dhcpserver or WinsPipe.</li>
<li>The target server attempts to authenticate to the attacker-controlled machine.</li>
<li>The attacker relays the Kerberos authentication attempt to a service on another server, impersonating the target server.</li>
<li>A Kerberos authentication event (Event ID 4624 or 4625) is generated, indicating a network logon attempt using Kerberos. The account used ends with &lsquo;$&rsquo;, signifying a computer account.</li>
<li>The source IP address of the authentication event is different from the target server&rsquo;s IP address, indicating the authentication attempt originated from a different host.</li>
<li>If successful (Event ID 4624), the attacker gains unauthorized access to the service on the second server, impersonating the target server&rsquo;s computer account.</li>
<li>The attacker executes commands or performs actions on the compromised service, potentially leading to data exfiltration, system compromise, or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberos relay attack can lead to a full compromise of the targeted server, potentially allowing the attacker to execute arbitrary code with SYSTEM privileges. This can result in data exfiltration, service disruption, and further lateral movement within the network. The scope of the impact depends on the privileges of the compromised computer account and the services accessible to it. Organizations that do not properly patch CVE-2025-33073 or implement SMB signing/sealing/channel binding are at higher risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Kerberos Relay Attack against a Computer Account&rdquo; to your SIEM to detect this activity and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the sequence of events and the source IP address involved.</li>
<li>Patch CVE-2025-33073 on all affected Windows servers to prevent reflective Kerberos relay attacks.</li>
<li>Enable SMB signing or service-specific signing/sealing/channel binding on affected service tiers to mitigate relay attacks.</li>
<li>Monitor Windows Security Event Logs for Event ID 5145 (file access) and Event IDs 4624/4625 (authentication attempts) for suspicious activity.</li>
<li>Restrict coercion-prone RPC and named-pipe exposure to limit the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>relay</category><category>credential_access</category><category>windows</category></item><item><title>Detects Kirbi File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</guid><description>Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.</description><content:encoded><![CDATA[<p>The creation of <code>.kirbi</code> files on Windows systems is a strong indicator of potential Kerberos ticket theft. These files are Kerberos ticket artifacts often associated with credential dumping and Pass-The-Ticket (PTT) attacks. Tools like Mimikatz and Rubeus are commonly used to export or dump Kerberos tickets, which are then saved as <code>.kirbi</code> files. Defenders should monitor the creation of these files, especially in unusual locations, and investigate the associated processes to determine if malicious activity is occurring. The rule provided is designed to detect these events across multiple data sources, providing a comprehensive approach to identifying this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a Kerberos ticket dumping tool, such as Mimikatz or Rubeus.</li>
<li>The tool extracts Kerberos tickets from memory.</li>
<li>The extracted tickets are saved to a <code>.kirbi</code> file on the filesystem. This file is often created in a temporary or easily accessible location.</li>
<li>The attacker may rename or move the <code>.kirbi</code> file to evade detection or prepare it for later use.</li>
<li>The attacker uses the stolen Kerberos ticket to authenticate to other systems on the network (Pass-The-Ticket).</li>
<li>The attacker gains unauthorized access to sensitive resources or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberos ticket theft can lead to significant damage, including unauthorized access to sensitive data, lateral movement across the network, and privilege escalation. Depending on the compromised account, an attacker can potentially gain control of critical systems and data. If a domain administrator account is compromised, the entire domain could be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kirbi File Creation</code> to your SIEM to detect the creation of <code>.kirbi</code> files.</li>
<li>Enable Sysmon FileCreate events (Event ID 11) to provide the necessary data for the <code>Kirbi File Creation</code> rule to function effectively.</li>
<li>Investigate any alerts generated by the <code>Kirbi File Creation</code> rule, focusing on the process that created the file, the location of the file, and any follow-on activity.</li>
<li>Consider blocking the execution of known Kerberos ticket dumping tools, such as Mimikatz and Rubeus.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>pass-the-ticket</category><category>mimikatz</category><category>rubeus</category></item></channel></rss>