
Summary
This rule detects potential Kerberos attacks on macOS systems using the Bifrost tool, which is known for leveraging vulnerabilities in Kerberos authentication. The rule is designed to identify processes that start with specific command-line arguments associated with Kerberos ticket manipulation techniques, such as 'kerberoasting' and 'pass-the-ticket'. A high risk score of 73 indicates the severity of the incidents detected. The rule requires the Elastic Defend integration, which allows Enhanced Detection and Response (EDR) capabilities to monitor endpoint events effectively. Investigations are ideally focusing on legitimate user actions compared to suspicious activities initiated by unauthorized accounts, along with documentation practices to prevent false positives from legitimate administrative actions. In case of detections, isolation of affected systems and revocation of any potentially compromised tickets are critical response actions.
Categories
- macOS
- Endpoint
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1550
- T1550.003
- T1558
- T1558.003
Created: 2020-01-12