This article explores a way in which hackers steal data once they managed to compromise a company computer or laptop. We will continue to explore other ways to develop a cyber attack once an asset is compromised, in the following blog posts. The premise of this article is the typical scenario where an external attacker manages to execute code as local system on a domain machine, either by gaining access to privileged credentials through social engineering or by exploiting vulnerabilities allowing code execution. The aim of the attacker is to move from the unimportant compromised asset to more important domain machines, to steal information.
HTTP digest and Simple Authentication Security Layer require passwords in plain text to function. Hence, the OS starting with Windows XP uses a DLL that enables these protocols and holds passwords of current and recent interactive and network sessions stored in clear text, in the memory. Starting with Windows 10 (KB2871997 introduced this for Windows 7, 8 and 2008 R2 and 2012 Server), the storing of passwords in clear text in memory has been removed by default but remained configurable via the registry.
Tools like “mimikatz”, initially designed for ethical hacking and security use cases, can be used to dump passwords from memory in clear text, and there are usually high chances that the list contains valuable domain account credentials which can be used to penetrate more significant assets in the company. More information about this tool can be found here.
Once credentials are retrieved, attackers can use them to connect to domain machines and access information there, looking for valuable data either via network shares or remote desktop connections.
The use of such tools is hard to detect through AV functionality as source code is available and new versions can easily be compiled, evading AV signature checks. This entire scenario is also difficult to detect via complex IDS systems as there may be no unusual behavior happening on the machine(s) involved. If the attacker does not use privileges to access security systems or make changes to security settings (user accounts, other privileges, etc.), and sticks to going for data in files, IDS tools are very likely to miss such an attack.
The best defenses against this scenario are
Our recommendation, especially in lack of complex IDS solutions, is to monitor authorized access to data to identify suspicious patterns, that appear when attackers (using compromised accounts) are looking for valuable information:
Taking such measures gives you a better chance of identifying an attacker who uses an authorized account to steal data. Also, since this scenario gives attackers a list of credentials, it is very likely that these are verified so that their value can be assessed. The fastest way to do that is impersonating these credentials from a single compromised account. Therefore, watching for impersonated access to files is also important, particularly if there is a significant number of such operations, with the same original security context, but with various other impersonated user accounts.
TEMASOFT FileMonitor, our file monitoring software, can help you monitor impersonated and authorized access to files in ways that permit identification of suspicious activity, allowing alerting, reactions and further investigation in such situations.
TEMASOFT offers this application for FREE for up to two workstation PCs, for personal use.
Liked this article? Follow us on LinkedIn for more, or subscribe to our newsletter.
References:
https://support.microsoft.com/en-us/kb/2871997
https://www.sans.org/reading-room/whitepapers/detection/mimikatz-overview-defenses-detection-36780
This post was last modified on August 21, 2023 7:27 am
In the digital world, information is often stored and transferred through files. From the most…
Introduction Data security is more important than ever in today's fast-paced digital world. One critical…
Introduction: Cyber threats are a growing concern for businesses and individuals alike. With the increasing…
Microsoft Internet Information Services (IIS) is a popular web server that is widely used to…
File tracking is an important aspect of server administration, and it can help administrators detect…
File monitoring solutions are essential tools for administrators to manage and protect their organizations' data…