<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>T1484.001 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/t1484.001/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/t1484.001/feed.xml" rel="self" type="application/rss+xml"/><item><title>Active Directory Group Policy Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-ad-gpo-deleted/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ad-gpo-deleted/</guid><description>Detection of Active Directory Group Policy deletion using event ID 5136, indicating potential malicious activity or misconfiguration.</description><content:encoded><![CDATA[<p>This detection identifies when an Active Directory Group Policy Object (GPO) is deleted, potentially indicating malicious activity aimed at disrupting organizational policies or misconfigurations leading to unintended changes. The detection leverages Windows Event Log Security (event ID 5136) and Active Directory monitoring data to correlate the deletion event with the GPO name and the user responsible. It is important to investigate these events promptly, as GPO deletions can have significant impact on the security posture and functionality of a Windows domain. This alert helps defenders identify unauthorized or accidental GPO deletions, enabling rapid response and remediation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an account with sufficient privileges to manage Group Policy Objects (GPOs).</li>
<li>The attacker uses the Group Policy Management Console (GPMC) or PowerShell cmdlets (e.g., <code>Remove-GPO</code>) to initiate the deletion of a targeted GPO.</li>
<li>The deletion event generates Windows Security Event ID 5136, logging details of the object being modified (the GPO). The <code>AttributeLDAPDisplayName</code> is <code>gpLink</code>.</li>
<li>The event includes OperationType codes %%14675 (old value) and %%14674 (new value) showing the before and after states of the GPO.</li>
<li>The event also includes the <code>ObjectDN</code> (Distinguished Name) of the deleted GPO.</li>
<li>Active Directory monitoring (<code>admon</code>) events, specifically updates to <code>Group-Policy-Container</code>, provide the <code>displayName</code> of the GPO based on its <code>distinguishedName</code>.</li>
<li>The <code>gpLink</code> attribute is removed from the affected Organizational Units (OUs) or domains where the GPO was applied, effectively removing the policies associated with that GPO.</li>
<li>The deletion of the GPO can lead to changes in user and computer settings, potentially weakening security controls or disrupting normal operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of GPOs can severely impact an organization&rsquo;s security posture. Deleted GPOs can lead to systems reverting to default configurations, removal of security policies, and potential exposure to vulnerabilities. The scope of impact depends on the criticality and scope of the deleted GPOs, ranging from affecting a small group of users to compromising the entire domain. This can lead to data breaches, system compromise, or disruption of services. Early detection and remediation are crucial to minimize potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure Active Directory auditing is enabled and ingesting Windows Security Event ID 5136 and Active Directory monitoring data. See the referenced Splunk Lantern article for guidance.</li>
<li>Configure the <code>wineventlog_security</code> and <code>admon</code> macros in your Splunk environment to point to the correct indexes as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the provided Sigma rule &ldquo;AD GPO Deleted via Event 5136&rdquo; to detect GPO deletion events. Tune the rule&rsquo;s filter (<code>windows_ad_gpo_deleted_filter</code>) to exclude any known legitimate GPO deletion activities.</li>
<li>Investigate all triggered alerts by examining the source user (<code>src_user</code>) and the deleted GPO (<code>policyName</code>) to determine if the deletion was authorized.</li>
<li>Utilize the provided drilldown searches to investigate the activity of the source user and any associated risk events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>group-policy</category><category>gpo</category><category>deletion</category><category>t1484.001</category></item></channel></rss>