<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Laps — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/laps/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/laps/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detecting Windows LAPS Password Gathering via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-laps-password-gathering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-laps-password-gathering/</guid><description>This brief outlines detection strategies for adversaries attempting to retrieve LAPS passwords using PowerShell and the 'ms-Mcs-AdmPwd' property, potentially leading to lateral movement and privilege escalation within a Windows domain.</description><content:encoded><![CDATA[<p>This threat focuses on detecting malicious actors attempting to gather Local Administrator Password Solution (LAPS) passwords via PowerShell. Microsoft LAPS is used to manage local administrator accounts within an Active Directory (AD) domain, automating password rotation and storage. While beneficial for security, a poorly configured LAPS implementation can be exploited, allowing unauthorized access to local administrator credentials. The detection relies on identifying PowerShell scripts that utilize the <code>Get-AdComputer</code> cmdlet and the <code>ms-Mcs-AdmPwd</code> property, indicative of attempts to retrieve LAPS-managed passwords. Successful exploitation can grant attackers local administrative privileges on targeted machines, facilitating lateral movement and further compromise within the environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a compromised account or system within the target domain.</li>
<li>The attacker uses PowerShell to execute a script that queries Active Directory for computer objects.</li>
<li>The script uses <code>Get-AdComputer</code> to retrieve computer objects.</li>
<li>The script filters the results to find the <code>ms-Mcs-AdmPwd</code> attribute, which stores the LAPS password.</li>
<li>The attacker retrieves the LAPS password for the target computer.</li>
<li>The attacker uses the retrieved LAPS password to authenticate to the target computer.</li>
<li>The attacker gains local administrator privileges on the target computer.</li>
<li>The attacker uses the compromised system as a pivot for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to widespread compromise within the targeted environment. An attacker who obtains LAPS passwords can gain local administrator access to multiple machines, enabling lateral movement, data theft, and potentially the deployment of ransomware. The impact can range from data breaches and service disruptions to complete control over the organization&rsquo;s IT infrastructure. The number of affected systems depends on the attacker&rsquo;s persistence and the scope of the LAPS deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect PowerShell scripts querying AD for LAPS passwords via <code>ms-Mcs-AdmPwd</code>.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user and machine involved.</li>
<li>Review and harden LAPS configuration to ensure proper access controls are in place.</li>
<li>Monitor PowerShell script block logging (Event ID 4104) for suspicious activity related to Active Directory queries.</li>
<li>Implement robust access controls to prevent unauthorized access to LAPS data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>laps</category><category>credential-access</category><category>powershell</category><category>windows</category></item></channel></rss>