T1003 OS Credential Dumping
Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform Lateral Movement and access restricted information.
Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.
Item | Value |
---|---|
ID | T1003 |
Sub-techniques | T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008 |
Tactics | TA0006 |
Platforms | Linux, Windows, macOS |
Permissions required | Administrator, SYSTEM, root |
Version | 2.1 |
Created | 31 May 2017 |
Last Modified | 08 March 2022 |
Procedure Examples
ID | Name | Description |
---|---|---|
G0007 | APT28 | APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.272829 |
G0050 | APT32 | APT32 used GetPassword_x64 to harvest credentials.2425 |
G0087 | APT39 | APT39 has used different versions of Mimikatz to obtain credentials.31 |
G0001 | Axiom | Axiom has been known to dump credentials.35 |
S0030 | Carbanak | Carbanak obtains Windows logon password details.19 |
S0232 | HOMEFRY | HOMEFRY can perform credential dumping.22 |
G0065 | Leviathan | Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.34 |
S0052 | OnionDuke | OnionDuke steals credentials from its victims.20 |
S0048 | PinchDuke | PinchDuke steals credentials from compromised hosts. PinchDuke‘s credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated many sources such as WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).20 |
G0033 | Poseidon Group | Poseidon Group conducts credential dumping on victims, with a focus on obtaining credentials belonging to domain and database servers.32 |
S0379 | Revenge RAT | Revenge RAT has a plugin for credential harvesting.21 |
G0054 | Sowbug | Sowbug has used credential dumping tools.33 |
G0039 | Suckfly | Suckfly used a signed credential-dumping tool to obtain victim account credentials.26 |
G0131 | Tonto Team | Tonto Team has used a variety of credential dumping tools.30 |
S0094 | Trojan.Karagany | Trojan.Karagany can dump passwords and save them into \ProgramData\Mail\MailAg\pwds.txt .23 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1015 | Active Directory Configuration | |
Manage the access control list for “Replicating Directory Changes” and other permissions associated with domain controller replication. 9 17 Consider adding users to the “Protected Users” Active Directory security group. This can help limit the caching of users’ plaintext credentials.18 | ||
M1040 | Behavior Prevention on Endpoint | On Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing. 16 |
M1043 | Credential Access Protection | With Windows 10, Microsoft implemented new protections called Credential Guard to protect the LSA secrets that can be used to obtain credentials through forms of credential dumping. It is not configured by default and has hardware and firmware system requirements. 12 It also does not protect against all forms of credential dumping. 13 |
M1041 | Encrypt Sensitive Information | Ensure Domain Controller backups are properly secured. |
M1028 | Operating System Configuration | |
Consider disabling or restricting NTLM.14 Consider disabling WDigest authentication.15 | ||
M1027 | Password Policies | Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
M1026 | Privileged Account Management | Windows: |
Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers.10 | ||
M1025 | Privileged Process Integrity | |
On Windows 8.1 and Windows Server 2012 R2, enable Protected Process Light for LSA.11 | ||
M1017 | User Training | Limit credential overlap across accounts and systems by training users and administrators not to use the same password for multiple accounts. |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0026 | Active Directory | Active Directory Object Access |
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0029 | Network Traffic | Network Traffic Content |
DS0009 | Process | OS API Execution |
DS0024 | Windows Registry | Windows Registry Key Access |
References
-
French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019. ↩
-
Microsoft. (2017, December 1). MS-DRSR Directory Replication Service (DRS) Remote Protocol. Retrieved December 4, 2017. ↩
-
Microsoft. (n.d.). IDL_DRSGetNCChanges (Opnum 3). Retrieved December 4, 2017. ↩
-
Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved December 4, 2017. ↩
-
Microsoft. (2017, December 1). MS-NRPC - Netlogon Remote Protocol. Retrieved December 6, 2017. ↩
-
Microsoft. (n.d.). MS-SAMR Security Account Manager (SAM) Remote Protocol (Client-to-Server) - Transport. Retrieved December 4, 2017. ↩
-
Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved December 4, 2017. ↩
-
Plett, C., Poggemeyer, L. (12, October 26). Securing Privileged Access Reference Material. Retrieved April 25, 2017. ↩
-
Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015. ↩
-
Lich, B. (2016, May 31). Protect derived domain credentials with Credential Guard. Retrieved June 1, 2016. ↩
-
NSA IAD. (2017, April 20). Secure Host Baseline - Credential Guard. Retrieved April 25, 2017. ↩
-
Microsoft. (2012, November 29). Using security policies to restrict NTLM traffic. Retrieved December 4, 2017. ↩
-
Microsoft. (2014, May 13). Microsoft Security Advisory: Update to improve credentials protection and management. Retrieved June 8, 2020. ↩
-
Microsoft. (2021, July 2). Use attack surface reduction rules to prevent malware infection. Retrieved June 24, 2021. ↩
-
Microsoft. (n.d.). How to grant the “Replicating Directory Changes” permission for the Microsoft Metadirectory Services ADMA service account. Retrieved December 4, 2017. ↩
-
Microsoft. (2016, October 12). Protected Users Security Group. Retrieved May 29, 2020. ↩
-
Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018. ↩
-
F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015. ↩↩
-
Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019. ↩
-
FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018. ↩
-
Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016. ↩
-
Dahan, A. (2017, May 24). OPERATION COBALT KITTY: A LARGE-SCALE APT IN ASIA CARRIED OUT BY THE OCEANLOTUS GROUP. Retrieved November 5, 2018. ↩
-
Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018. ↩
-
DiMaggio, J. (2016, May 17). Indian organizations targeted in Suckfly attacks. Retrieved August 3, 2016. ↩
-
ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016. ↩
-
Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018. ↩
-
Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020. ↩
-
Daniel Lughi, Jaromir Horejsi. (2020, October 2). Tonto Team - Exploring the TTPs of an advanced threat actor operating a large infrastructure. Retrieved October 17, 2021. ↩
-
Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020. ↩
-
Kaspersky Lab’s Global Research and Analysis Team. (2016, February 9). Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage. Retrieved March 16, 2016. ↩
-
Symantec Security Response. (2017, November 7). Sowbug: Cyber espionage group targets South American and Southeast Asian governments. Retrieved November 16, 2017. ↩
-
Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019. ↩
-
Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014. ↩