sb-as logo
Story image

The cyber kill chain: Moving laterally in Active Directory

04 Mar 2019

Article by ManageEngine marketing manager Ram Vaidyanathan

Every company is susceptible to a data breach.

Given the number of endpoints an organisation usually has and how often employees are manipulated by social engineering and malware-laden emails, attackers can easily gain an initial foothold in a company's network.

This can happen even if a company performs extensive risk assessments and utilises perimeter protection devices like firewalls.

Perimeter protection has proven to be necessary, but not entirely sufficient for defence.

How else can we explain some of the biggest data breaches that large corporations have had to face? 

More often than not, cybercriminals get into a network using malware.

They will then usually start compiling a list of target domain controllers with credential information, or database servers that hold valuable data assets.

In due course, they will develop an attack map that details a clear path of burrowing deeper.

Using different techniques, they will move laterally through the network, gaining more and more privileged access until they gain entry to their target domain controllers.

This lateral movement is the part of the cyber kill chain in which attackers are most vulnerable and exposed.

At this phase, they are actively trying to jump from one machine to another.

So how do cybercriminals move laterally through a network?

What exactly do they do after getting in?

And what can companies do to stop them in their tracks?

The anatomy of an attack

There are numerous ways an attacker can move through a network, and it's important to understand how this is generally done.

While the tools used to carry out an attack may be different, the steps are usually the same. Understanding how an attack progresses and getting into the criminal's mind will help companies better defend themselves.

Another key thing to remember is that companies can use the same tools hackers use to perform penetration tests.

After gaining an initial foothold, the first thing an attacker might do is a network scan.

A network scan will show them the list of active hosts on the network along with their IP addresses.

They can then use a technique called port scanning to send messages to each port on a machine one by one.

If they receive a response, the attacker will assume the port is in use and may decide to probe it further for vulnerabilities.

A port scan will also help the attacker figure out what services run on what machines.

Using this information, they may decide to exploit the known vulnerabilities of those services.

The next thing the attacker may do is attempt to figure out the logical and physical structure of the company's Active Directory (AD).

One of the simplest ways to do this is by using PowerShell, a tool that is provided by Microsoft itself. PowerShell is a task-based, command-line scripting language built on .NET that lets admins manage computers using cmdlets (pronounced “command lets”).

Since PowerShell is trusted by the Windows environment, actions carried out using PowerShell scripting usually don't raise any alarms.

Using the right cmdlets, a threat actor can look at group memberships, observe service accounts, find out password policies, and identify important servers like domain controllers.

PowerShell also has the flexibility to work in remote desktop connections, which further complicates the problem.

Attackers may use tools like PowerSploit to make their attacks more sophisticated.

After all this investigating, the attacker will know exactly what machines to target to begin moving laterally.

Attackers also use tools like BloodHound that use graph theory to reveal hidden and often unintended relationships within AD environments.

BloodHound displays probable attack paths in its graph drawing area.

BloodHound, co-founder Andy Robbins says "An attacker would be interested in effective privileges for other users. BloodHound gives this information about every user in the domain. What local admin rights and group memberships does a particular user have?"

The tool is simple enough for the script novice yet suave enough for the more serious operator.

If the attacker gains access to a system where a user is a local admin and there are active sessions in that system, they can steal the credentials of those active sessions.

To steal credentials, attackers use popular tools like Mimikatz, which is used to perform pass-the-hash and pass-the-ticket attacks.

Using these techniques, they can move from one computer to the next and ultimately gain domain administrator privileges.

How can companies defend themselves against lateral movement?

Real-time event log correlation and augmented threat intelligence systems are critical to prevent attackers from moving laterally through a network.

These tools can process nearly 25,000 logs per second and detect attacks in real time.

These tools alert security professionals the moment certain risky conditions are detected.

For example, if there is an unusually high number of logon failures from a particular user, membership to an important organisational unit or privileged group changes, or GPOs or GPO links are modified, security professionals would instantly receive an alert, as these could be tell-tale signs of an attacker attempting to escalate privileges.

Another aspect that plays a critical role in defending against lateral movement is user behaviour analytics, or UEBA. UEBA tools apply machine learning to create a baseline of normal activities that are specific to each user and notify security personnel when there is a deviation from this norm.

For example, a user who consistently accesses a critical server outside of business hours won't trigger an alert for this activity, because that behaviour is typical for that user.

If they try to access that server during a time they've never accessed it before—even if it falls within business hours—this activity will be considered unusual and will raise an alert.

Apart from using the right tools, companies must educate users about the importance of security hygiene.

Conducting regular red team-blue team exercises is an important part of penetration testing and will allow security teams to get familiar with using some of the above tools.

And all of this needs to be a coordinated effort under the authority of a central risk team, who, in turn, works under the guidance of a chief risk officer.

Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More