heroui logo

Potential Credential Access via DCSync

Elastic Detection Rules

View Source
Summary
The rule 'Potential Credential Access via DCSync' is designed to detect suspicious activity related to the Active Directory (AD) replication process, which can be exploited by attackers to extract sensitive credential information from the domain. This exploitation is executed through the DCSync technique that mimics the replication behavior of legitimate domain controllers. The rule focuses on monitoring instances of Event ID 4662, which indicates operations performed on AD objects, particularly filtering by access masks that allow control access, and specific rights related to credential replication. Attackers often use accounts with elevated privileges to perform DCSync, so identifying unauthorized attempts to replicate AD data is crucial. The rule includes guidance on how to investigate detected activities, potential false positives, incident response actions, and the necessary logging configuration to ensure adequate monitoring of the directory service access.
Categories
  • Windows
  • Endpoint
  • Identity Management
  • Cloud
  • Infrastructure
Data Sources
  • User Account
  • Active Directory
  • Logon Session
  • Network Traffic
  • Process
ATT&CK Techniques
  • T1003
  • T1003.006
  • T1078
  • T1078.002
Created: 2022-02-08