Account manipulation is a technique used by attackers to gain access to critical resources. In this technique, the attacker gets hold of a user account which doesn't have enough privileges to access the required resource or data, and elevates its privileges.
After gaining access to a user account, to obtain additional privileges and perform certain adverse actions, attackers manipulate the account by revising their Group Policy permissions, updating credentials to increase their lifetime, and changing account and authentication settings.
If the attackers compromise an administrative account, or escalate the privileges of a standard user account to perform administrative tasks, they can create new user accounts. They can then assign a set of permissions to these user accounts and use them as backdoor entry points to your network in the future.
All user and system accounts present in your Active Directory and cloud platforms have to be constantly monitored to spot deviant activities. Make sure you check for the below anomalies in your network to detect account manipulation:
Event ID | Description |
---|---|
4722 | This is generated for User Account Management events. This event ID is logged when a user account is enabled or disabled. |
4724 | Event ID 4724 specifies that an account's password was reset. |
4738 | This event ID specifies if any modification is done to account's permissions. |
Correlate all your network logs to gain adequate knowledge about how an attacker compromises a user account, laterally moves in your network and misuses privileged user accounts to his benefits. Identify user and system accounts that have deviant and anomalous behavior by analyzing all the collected logs.
Once such accounts are identified, reset passwords of compromised user accounts. Harden the authentication mechanisms by employing multi-factor authentication for privileged and administrative user accounts as a security best practice. It can be difficult to spot anomalies in the huge pile of collected logs manually. You can use a security information and event management (SIEM) solution to help you detect malicious activities.
Log360 is a SIEM solution that can collect logs from all devices across your network. It correlates activities that occur in all parts of your network and generates intuitive reports. Log360 allows you to configure real-time alerts for deviant activities and notifies you via SMS and email in case of a threat or an attack. Using Log360, you can configure incident workflows as responses to threats to mitigate them at early stages.
Check out the capabilities of Log360 now.
Zoho Corporation Pvt. Ltd. All rights reserved.