<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>IGEL — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/igel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 17:45:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/igel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Kerberos Authentication Ticket Request</title><link>https://feed.craftedsignal.io/briefs/2026-05-suspicious-kerberos-auth/</link><pubDate>Tue, 12 May 2026 17:45:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-suspicious-kerberos-auth/</guid><description>This rule detects suspicious Kerberos authentication ticket requests by correlating network connections to the standard Kerberos port (88) from a source machine with a Kerberos authentication ticket request from the target domain controller, which could indicate lateral movement or credential access attempts within a Windows domain.</description><content:encoded><![CDATA[<p>This detection rule correlates network connections to the standard Kerberos port (88) by an unusual process from the source machine with a Kerberos authentication ticket request from the target domain controller. It aims to identify potential lateral movement or credential access attempts within a Windows domain. The rule focuses on identifying processes other than the standard <code>lsass.exe</code> or known Tomcat services making Kerberos requests. This is important for defenders as Kerberos is a critical authentication protocol and unusual activity can signal malicious behavior. The rule leverages EQL and considers data from various sources including endpoint events, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows endpoint within the network.</li>
<li>The attacker executes a malicious tool or leverages an existing binary to request a Kerberos ticket (TGT or TGS).</li>
<li>This tool establishes a network connection to the domain controller on port 88 (Kerberos).</li>
<li>The domain controller receives the Kerberos ticket request, logging event codes 4768 (Kerberos authentication ticket request) or 4769 (Kerberos service ticket request).</li>
<li>The detection rule identifies this network connection originating from an unusual process (not lsass.exe or known tomcat services) on the endpoint.</li>
<li>The rule correlates this network connection with the corresponding Kerberos authentication event on the domain controller within a defined timeframe (3 seconds).</li>
<li>Successful authentication may allow the attacker to move laterally within the network or access sensitive resources.</li>
<li>The attacker uses the obtained Kerberos ticket to authenticate to other systems or services in the domain, furthering their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to lateral movement within the network, unauthorized access to sensitive data, and potential compromise of critical systems. The rule&rsquo;s risk score is 73, indicating a high level of risk associated with this type of activity. Organizations could experience data breaches, financial losses, and reputational damage if such attacks are not detected and mitigated promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided EQL rule to your SIEM or Elastic environment to detect suspicious Kerberos authentication ticket requests.</li>
<li>Enable Sysmon event ID 3 (Network Connection) logging to provide the necessary network connection data.</li>
<li>Enable auditing for Kerberos authentication service (event ID 4768) and Kerberos service ticket operations (event ID 4769) on domain controllers.</li>
<li>Investigate any triggered alerts by examining the process executable, command line, target user name, and associated network activity as described in the rule&rsquo;s <code>note</code> section.</li>
<li>Tune the rule&rsquo;s process exceptions to account for legitimate Kerberos-capable clients in your environment.</li>
<li>Prioritize investigation of alerts where the source process is unsigned, renamed, user-writable, signer-mismatched, or outside known AD audit, Kerberos diagnostic, or security-test tooling as detailed in the note section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item></channel></rss>