Service accounts should never be part of the Domain Admins group.
Check and clean the DA group regularly because a TA could try to "Kerberoast" the service account, which is primarily a problem if the service account use a weak password (next point).
4/ Old passwords
All these accounts are part of the Domain Admins group. The passwords were last changed almost 20 years ago - you can imagine the password strength.
These passwords could probably be cracked very quickly to get the highest privileges on the network.
5/ No tiering model
As soon as we have a forensic agent in the network (e.g., during a compromise assessment), we check if DA's or highly privileged accounts log in to normal clients (which can be analyzed well with the event logs on the clients and servers).
6/ There are many ways attackers can grab a password from a compromised machine, which is why a clean tiering model, possibly with local firewall rules and hardening policies, should be used to prevent users and admins from logging in to all clients and servers.
1/ Sin #5: No in-depth analysis after a (security) incident
Time and again, we see that security incidents are not dealt with in sufficient depth, which can lead to further security problems, even more serious ones. 🧵
2/ A good example I always mention is the leak of the Fortinet VPN credentials.
Although many companies knew they were vulnerable at the time of this breach and patched their systems, many neglected to change the passwords.
3/ Even this year, we had IR cases where we found the user's credentials for the initial entry into the network in the leaked VPN passwords.
This is a classic example where a security incident was not dealt with sufficiently, and the critical password change was not carried out.
3/ For example, the following text in the picture below was sent from an external SOC to a customer. According to Windows Defender, among other things, Mimikatz was detected.
1/ We continue our path down the seven sins. Today's sin #2: Lack of MFA.
The slide below is almost an evergreen, and I sometimes joke during presentations that I should print it out and hand it out to clients.
But the importance of this point cannot be overemphasized.
🧵
2/ Among other things, we also investigate many BEC cases, which according to the FBI's Internet Crime Report, cause billions of dollars of damage yearly.
Nevertheless, in our IR cases, we repeatedly find OWA and Exchange Online accesses that are single-factor protected.
3/ Especially with Exchange Online, the legacy protocols must be switched off, as they cannot be protected with MFA. Attackers often use this "trick" to use the phished credentials despite MFA.
2/ Let's start with sin #1: Lack of patch management.
Lack of patch management is bad enough on internal systems (i.e., unpatched DCs), but on systems accessible from the Internet, not applying (security) patches can become an easy gateway into the internal network.
3/ The screenshot of the mailbox left is from a real IR case, taken in February this year (2022).
Creating these draft emails is a typical step in the ProxyShell exploitation, where a module for Metasploit alone was released on 18 August 2021!
In a recent IR case, the TA created persistences with #QakBot on almost every system in the network.
If only individual systems in the network were forensically examined, one or more infected systems would undoubtedly be missed.
🧵
2/ By examing the network connections made by the clients & servers with a forensic agent, it is apparent that QakBot has made a process injection into the following two processes:
3/ The analysis of the network connections gives us active C2 addresses that we can use for additional hunting inside the network (and in the FW logs).