Description
Adversaries may patch the authentication process on a domain controller to bypass the typical authentication mechanisms and enable access to accounts.
Malware may be used to inject false credentials into the authentication process on a domain controller with the intent of creating a backdoor used to access any user’s account and/or credentials (ex: Skeleton Key). Skeleton key works through a patch on an enterprise domain controller authentication process (LSASS) with credentials that adversaries may use to bypass the standard authentication system. Once patched, an adversary can use the injected password to successfully authenticate as any domain user account (until the the skeleton key is erased from memory by a reboot of the domain controller). Authenticated access may enable unfettered access to hosts and/or resources within single-factor authentication environments.(Citation: Dell Skeleton)
Platforms
Mitigations (4)
Privileged Account ManagementM1026
Audit domain and local accounts as well as their permission levels routinely to look for situations that could allow an adversary to gain wide access by obtaining credentials of a privileged account. (Citation: TechNet Credential Theft) (Citation: TechNet Least Privilege) These audits should also include if default accounts have been enabled, or if new local accounts are created that have not be a
Privileged Process IntegrityM1025
Enabled features, such as Protected Process Light (PPL), for LSA.(Citation: Microsoft LSA)
Multi-factor AuthenticationM1032
Integrating multi-factor authentication (MFA) as part of organizational policy can greatly reduce the risk of an adversary gaining control of valid credentials that may be used for additional tactics such as initial access, lateral movement, and collecting information. MFA can also be used to restrict access to cloud resources and APIs.
User TrainingM1017
Train users to recognize and handle suspicious email attachments. Emphasize the importance of caution when opening attachments from unknown or unexpected sources, even if they appear legitimate. Implement email warning banners to alert users about emails originating from outside the organization or containing attachments, reinforcing awareness and helping users identify potential spearphishing att
Threat Groups (1)
| ID | Group | Context |
|---|---|---|
| G0114 | Chimera | [Chimera](https://attack.mitre.org/groups/G0114)'s malware has altered the NTLM authentication program on domain controllers to allow [Chimera](https:... |
Associated Software (1)
| ID | Name | Type | Context |
|---|---|---|---|
| S0007 | Skeleton Key | Malware | [Skeleton Key](https://attack.mitre.org/software/S0007) is used to patch an enterprise domain controller authentication process with a backdoor passwo... |
References
Frequently Asked Questions
What is T1556.001 (Domain Controller Authentication)?
T1556.001 is a MITRE ATT&CK technique named 'Domain Controller Authentication'. It belongs to the Defense Impairment, Persistence, Credential Access tactic(s). Adversaries may patch the authentication process on a domain controller to bypass the typical authentication mechanisms and enable access to accounts. Malware may be used to inject false credentials...
How can T1556.001 be detected?
Detection of T1556.001 (Domain Controller Authentication) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.
What mitigations exist for T1556.001?
There are 4 documented mitigations for T1556.001. Key mitigations include: Privileged Account Management, Privileged Process Integrity, Multi-factor Authentication, User Training.
Which threat groups use T1556.001?
Known threat groups using T1556.001 include: Chimera.