In pass-the-hash attacks, the New Technology Local Area Network Manager (NTLM) hashes of passwords are abused to compromise privileged accounts to launch attacks.
Pass-the-hash attacks are difficult to find as they look like legitimate events. An adversary can steal the password hash and pretend to be a legitimate user accessing a critical resource, leaving little or no trace for the defense system to detect the attack. However, it's possible to detect and stop this attack technique.
In this article, we'll decipher how pass-the-hash attacks are carried out in networks and how you can mitigate them.
Here are the typical steps an attacker follows to infiltrate your network:
This process could take several days to weeks, during which the attackers stealthily lurk in your environment identifying vulnerabilities and locations of critical resources.
This way, the attacker can access any critical file or resource using the password hashes of the user accounts. Since these malicious logins and access attempts appear legitimate, it is tricky to distinguish between authorized and unauthorized access attempts, especially with the traditional signature-based attack detection techniques. However, there are a few tools and techniques to help you evade pass-the-hash attacks during their initial stages and safeguard your network.
Privilege escalation attempts during pass-the-hash attacks take place using the DCSync command that impersonates a domain controller and requests access to user accounts. This is often followed by abnormal behavior from compromised user accounts.
Installing Mimikatz is a clear indication of an attack and current antivirus software is equipped to detect this.
A clear giveaway of the pass-the-hash attack is suspicious logons using password hashes instead of clear text passwords.
You need to monitor your firewalls, endpoint devices, and user account logon patterns to detect pass-the-hash attacks.
Deploying individual monitoring tools for detecting attacks doesn't help much as you have to juggle multiple consoles to detect anomalies and obtain actionable insights.
A security information and event management (SIEM) solution helps you monitor all your network activities from a single console and provides you with all the required resources to detect and mitigate attacks.
SIEM incorporates the capabilities of intuitive analytics, real-time alerts, file integrity monitoring, automated incident response, and user and entity behavior analytics (UEBA) to help you contain and mitigate pass-the-hash attacks in your network and prevent any real damage. The pre-defined alerts will notify you of all the IoCs of pass-the-hash attacks.
You can build your own correlation rules to detect attack patterns and get notified in real-time!
The UEBA module can help you identify deviant user behavior, which assists with detecting IoCs of privilege escalations and object access attempts.
To see a SIEM solution in action, download the 30-day free trial of Log360, a ManageEngine SIEM solution, and receive a hands-on experience in detecting attacks.
Not ready to download the solution yet? Sign up for a free personalized demo for our product expert to walk you through Log360's capabilities.
You will receive regular updates on the latest news on cybersecurity.
© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.