heroui logo

Windows Unusual Count Of Disabled Users Failed Auth Using Kerberos

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows Unusual Count Of Disabled Users Failed Auth Using Kerberos' is designed to identify anomalous behavior indicative of password spraying attacks against disabled domain accounts within a Windows Active Directory environment. It analyzes Windows Event Logs, specifically monitoring Event Code 4768, which corresponds to Kerberos Ticket Granting Ticket (TGT) requests. When a client attempts to authenticate against multiple disabled accounts, resulting in failure code `0x12` (indicating the credentials have been revoked), this rule raises an alert. This type of behavior suggests potential malicious activities aimed at gaining unauthorized access or escalating privileges by exploiting accounts that should not be active. The implementation requires enabling the Advanced Security Audit policy for Kerberos authentication logs and proper ingestion of these events into a monitoring system like Splunk. As such, the rule serves as a critical surveillance mechanism to preemptively address security threats within the organization’s network.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.003
Created: 2024-11-13