Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)[1] [2] [3] [4] to simulate the replication process from a remote domain controller using a technique called DCSync.
Members of the Administrators, Domain Admins, and Enterprise Admin groups or computer accounts on the domain controller are able to run DCSync to pull password data[5] from Active Directory, which may include current and historical hashes of potentially useful accounts such as KRBTGT and Administrators. The hashes can then in turn be used to create a Golden Ticket for use in Pass the Ticket[6] or change an account's password as noted in Account Manipulation.[7]
DCSync functionality has been included in the "lsadump" module in Mimikatz.[8] Lsadump also includes NetSync, which performs DCSync over a legacy replication protocol.[9]
| ID | Name | Description |
|---|---|---|
| C0027 | C0027 |
During C0027, Scattered Spider performed domain replication.[10] |
| G1006 | Earth Lusca |
Earth Lusca has used a |
| G1004 | LAPSUS$ |
LAPSUS$ has used DCSync attacks to gather credentials for privilege escalation routines.[12] |
| S0002 | Mimikatz |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DCSync/NetSync.[13][8][14][15][16] |
| G0129 | Mustang Panda |
Mustang Panda has leveraged Mimikatz DCSync feature to obtain user credentials.[17] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used Mimikatz's DCSync to dump credentials from the memory of the targeted system.[18] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used privileged accounts to replicate directory service data with domain controllers.[19][20][21] |
| G1053 | Storm-0501 |
Storm-0501 has utilized DCSync to extract credentials from victims.[22] |
| ID | Mitigation | Description |
|---|---|---|
| M1015 | Active Directory Configuration |
Manage the access control list for "Replicating Directory Changes" and other permissions associated with domain controller replication.[5][23] |
| M1027 | Password Policies |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
| M1026 | Privileged Account Management |
Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0594 | Detection of Unauthorized DCSync Operations via Replication API Abuse | AN1632 |
Detects unauthorized invocation of replication operations (DCSync) via Directory Replication Service (DRS), often executed by threat actors using Mimikatz or similar tools from non-DC endpoints. |