heroui logo

Detect Credential Dumping through LSASS access

Splunk Security Content

View Source
Summary
This rule detects attempts to read the LSASS (Local Security Authority Subsystem Service) memory, which is a common tactic used by attackers for credential dumping, using Sysmon Event Code 10. The rule filters for specific access permissions (0x1010 and 0x1410) on the `lsass.exe` process. By monitoring such access attempts, organizations can identify potential credential extraction efforts that may lead to unauthorized access, data breaches, or the compromise of sensitive information. Proper triage is essential to distinguish between malicious acts and legitimate accesses, as various tools may access LSASS legitimately. This detection rule underlines the importance of monitoring LSASS activities within the endpoint's security posture.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1003.001
  • T1003
Created: 2024-11-13