Description
Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain.(Citation: Microsoft Trusts) Domain trusts allow the users of the trusted domain to access resources in the trusting domain. The information discovered may help the adversary conduct SID-History Injection, Pass the Ticket, and Kerberoasting.(Citation: AdSecurity Forging Trust Tickets)(Citation: Harmj0y Domain Trusts) Domain trusts can be enumerated using the DSEnumerateDomainTrusts() Win32 API call, .NET methods, and LDAP.(Citation: Harmj0y Domain Trusts) The Windows utility Nltest is known to be used by adversaries to enumerate domain trusts.(Citation: Microsoft Operation Wilysupply)
Platforms
Mitigations (2)
AuditM1047
Map the trusts within existing domains/forests and keep trust relationships to a minimum.
Network SegmentationM1030
Employ network segmentation for sensitive domains.(Citation: Harmj0y Domain Trusts).
Threat Groups (10)
| ID | Group | Context |
|---|---|---|
| G1043 | BlackByte | [BlackByte](https://attack.mitre.org/groups/G1043) enumerated Active Directory information and trust relationships during operations.(Citation: FBI Bl... |
| G1024 | Akira | [Akira](https://attack.mitre.org/groups/G1024) uses the built-in [Nltest](https://attack.mitre.org/software/S0359) utility or tools such as [AdFind](h... |
| G0114 | Chimera | [Chimera](https://attack.mitre.org/groups/G0114) has <code>nltest /domain_trusts</code> to identify domain trust relationships.(Citation: NCC Group Ch... |
| G1054 | MirrorFace | [MirrorFace](https://attack.mitre.org/groups/G1054) has run `nltest.exe /domain_trusts` on compromised systems to discover domain relationships.(Cita... |
| G0030 | Lotus Blossom | [Lotus Blossom](https://attack.mitre.org/groups/G0030) has used tools such as [AdFind](https://attack.mitre.org/software/S0552) to make Active Directo... |
| G1006 | Earth Lusca | [Earth Lusca](https://attack.mitre.org/groups/G1006) has used [Nltest](https://attack.mitre.org/software/S0359) to obtain information about domain con... |
| G1053 | Storm-0501 | [Storm-0501](https://attack.mitre.org/groups/G1053) has used Windows native utility [Nltest](https://attack.mitre.org/software/S0359) `nltest.exe` for... |
| G1046 | Storm-1811 | [Storm-1811](https://attack.mitre.org/groups/G1046) has enumerated domain accounts and access during intrusions.(Citation: Microsoft Storm-1811 2024) |
| G0059 | Magic Hound | [Magic Hound](https://attack.mitre.org/groups/G0059) has used a web shell to execute `nltest /trusted_domains` to identify trust relationships.(Citati... |
| G0061 | FIN8 | [FIN8](https://attack.mitre.org/groups/G0061) has retrieved a list of trusted domains by using <code>nltest.exe /domain_trusts</code>.(Citation: Bitde... |
Associated Software (20)
| ID | Name | Type | Context |
|---|---|---|---|
| S0363 | Empire | Tool | [Empire](https://attack.mitre.org/software/S0363) has modules for enumerating domain trusts.(Citation: Github PowerShell Empire) |
| S0534 | Bazar | Malware | [Bazar](https://attack.mitre.org/software/S0534) can use [Nltest](https://attack.mitre.org/software/S0359) tools to obtain information about the domai... |
| S0483 | IcedID | Malware | [IcedID](https://attack.mitre.org/software/S0483) used [Nltest](https://attack.mitre.org/software/S0359) during initial discovery.(Citation: DFIR_Sodi... |
| S1145 | Pikabot | Malware | [Pikabot](https://attack.mitre.org/software/S1145) will gather information concerning the Windows Domain the victim machine is a member of during exec... |
| S0552 | AdFind | Tool | [AdFind](https://attack.mitre.org/software/S0552) can gather information about organizational units (OUs) and domain trusts from Active Directory.(Cit... |
| S1071 | Rubeus | Tool | [Rubeus](https://attack.mitre.org/software/S1071) can gather information about domain trusts.(Citation: DFIR Ryuk's Return October 2020)(Citation: DFI... |
| S1124 | SocGholish | Malware | [SocGholish](https://attack.mitre.org/software/S1124) can profile compromised systems to identify domain trust relationships.(Citation: SocGholish-upd... |
| S9035 | LAMEHUG | Malware | [LAMEHUG](https://attack.mitre.org/software/S9035) can gather Active Directory domain information.(Citation: Nov AI Threat Tracker) |
| S1146 | MgBot | Malware | [MgBot](https://attack.mitre.org/software/S1146) includes modules for collecting information on local domain users and permissions.(Citation: Symantec... |
| S0359 | Nltest | Tool | [Nltest](https://attack.mitre.org/software/S0359) may be used to enumerate trusted domains by using commands such as <code>nltest /domain_trusts</code... |
| S0650 | QakBot | Malware | [QakBot](https://attack.mitre.org/software/S0650) can run <code>nltest /domain_trusts /all_trusts</code> for domain trust discovery.(Citation: Kaspers... |
| S1063 | Brute Ratel C4 | Tool | [Brute Ratel C4](https://attack.mitre.org/software/S1063) can use LDAP queries and `nltest /domain_trusts` for domain trust discovery.(Citation: Palo ... |
| S0521 | BloodHound | Tool | [BloodHound](https://attack.mitre.org/software/S0521) has the ability to map domain trusts and identify misconfigurations for potential abuse.(Citatio... |
| S1160 | Latrodectus | Malware | [Latrodectus](https://attack.mitre.org/software/S1160) can run `C:\Windows\System32\cmd.exe /c nltest /domain_trusts` to discover domain trusts.(Citat... |
| S1081 | BADHATCH | Malware | [BADHATCH](https://attack.mitre.org/software/S1081) can use `nltest.exe /domain_trusts` to discover domain trust relationships on a compromised machin... |
| S1159 | DUSTTRAP | Malware | [DUSTTRAP](https://attack.mitre.org/software/S1159) can identify Active Directory information and related items.(Citation: Google Cloud APT41 2024) |
| S0378 | PoshC2 | Tool | [PoshC2](https://attack.mitre.org/software/S0378) has modules for enumerating domain trusts.(Citation: GitHub PoshC2) |
| S0105 | dsquery | Tool | [dsquery](https://attack.mitre.org/software/S0105) can be used to gather information on domain trusts with <code>dsquery * -filter "(objectClass=trust... |
| S0194 | PowerSploit | Tool | [PowerSploit](https://attack.mitre.org/software/S0194) has modules such as <code>Get-NetDomainTrust</code> and <code>Get-NetForestTrust</code> to enum... |
| S0266 | TrickBot | Malware | [TrickBot](https://attack.mitre.org/software/S0266) can gather information about domain trusts by utilizing [Nltest](https://attack.mitre.org/software... |
References
- Florio, E.. (2017, May 4). Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack. Retrieved February 14, 2019.
- Metcalf, S. (2015, July 15). It’s All About Trust – Forging Kerberos Trust Tickets to Spoof Access across Active Directory Trusts. Retrieved February 14, 2019.
- Microsoft. (2009, October 7). Trust Technologies. Retrieved February 14, 2019.
- Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.
- Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.
Frequently Asked Questions
What is T1482 (Domain Trust Discovery)?
T1482 is a MITRE ATT&CK technique named 'Domain Trust Discovery'. It belongs to the Discovery tactic(s). Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provi...
How can T1482 be detected?
Detection of T1482 (Domain Trust Discovery) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.
What mitigations exist for T1482?
There are 2 documented mitigations for T1482. Key mitigations include: Audit, Network Segmentation.
Which threat groups use T1482?
Known threat groups using T1482 include: BlackByte, Akira, Chimera, MirrorFace, Lotus Blossom, Earth Lusca, Storm-0501, Storm-1811.