| ID | Name |
|---|---|
| T1078.001 | Default Accounts |
| T1078.002 | Domain Accounts |
| T1078.003 | Local Accounts |
| T1078.004 | Cloud Accounts |
Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.[1] Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.[2]
Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as OS Credential Dumping or password reuse, allowing access to privileged resources of the domain.
| ID | Name | Description |
|---|---|---|
| G1030 | Agrius |
Agrius attempted to acquire valid credentials for victim environments through various means to enable follow-on lateral movement.[3] |
| G0022 | APT3 |
APT3 leverages valid accounts after gaining credentials for use within the victim domain.[4] |
| G1023 | APT5 |
APT5 has used legitimate account credentials to move laterally through compromised environments.[5] |
| G0143 | Aquatic Panda |
Aquatic Panda used multiple mechanisms to capture valid user accounts for victim domains to enable lateral movement and access to additional hosts in victim environments.[6] |
| G1043 | BlackByte |
BlackByte captured credentials for or impersonated domain administration users.[7][8] |
| G0114 | Chimera |
Chimera has used compromised domain accounts to gain access to the target environment.[9] |
| G1021 | Cinnamon Tempest |
Cinnamon Tempest has obtained highly privileged credentials such as domain administrator in order to deploy malware.[10] |
| S0154 | Cobalt Strike |
Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account.[11][12][13] |
| S1024 | CreepySnail |
CreepySnail can use stolen credentials to authenticate on target networks.[14] |
| C0029 | Cutting Edge |
During Cutting Edge, threat actors used compromised VPN accounts for lateral movement on targeted networks.[15] |
| G0119 | Indrik Spider |
Indrik Spider has collected credentials from infected systems, including domain accounts.[16] |
| C0049 | Leviathan Australian Intrusions |
Leviathan compromised domain credentials during Leviathan Australian Intrusions.[17] |
| G0059 | Magic Hound |
Magic Hound has used domain administrator accounts after dumping LSASS process memory.[18] |
| G0019 | Naikon |
Naikon has used administrator credentials for lateral movement in compromised networks.[19] |
| C0002 | Night Dragon |
During Night Dragon, threat actors used domain accounts to gain further access to victim systems.[20] |
| G0049 | OilRig |
OilRig has used an exfiltration tool named STEALHOOK to retreive valid domain credentials.[21] |
| C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used compromised domain administrator credentials as part of their lateral movement.[22] |
| C0023 | Operation Ghost |
For Operation Ghost, APT29 used stolen administrator credentials for lateral movement on compromised networks.[23] |
| C0048 | Operation MidnightEclipse |
During Operation MidnightEclipse, threat actors used a compromised domain admin account to move laterally.[24] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation.[25] |
| G1040 | Play | |
| S0446 | Ryuk |
Ryuk can use stolen domain admin accounts to move laterally within a victim domain.[27] |
| C0059 | Salesforce Data Exfiltration |
During Salesforce Data Exfiltration, threat actors used compromised credentials for lateral movement.[28][29] |
| G0034 | Sandworm Team |
Sandworm Team has used stolen credentials to access administrative accounts within the domain.[30][31] |
| S0140 | Shamoon |
If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.[32][33] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used domain administrators' accounts to help facilitate lateral movement on compromised networks.[34] |
| S0603 | Stuxnet |
Stuxnet attempts to access network resources with a domain account’s credentials.[35] |
| G0092 | TA505 |
TA505 has used stolen domain admin accounts to compromise additional hosts.[36] |
| G0028 | Threat Group-1314 |
Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally.[37] |
| G1022 | ToddyCat |
ToddyCat has used compromised domain admin credentials to mount local network shares.[38] |
| G1017 | Volt Typhoon |
Volt Typhoon has used compromised domain accounts to authenticate to devices on compromised networks.[39][40][41] |
| G0102 | Wizard Spider |
Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.[42] |
| ID | Mitigation | Description |
|---|---|---|
| M1032 | Multi-factor Authentication |
Integrating multi-factor authentication (MFA) as part of organizational policy can greatly reduce the risk of an adversary gaining control of valid credentials that may be used for additional tactics such as initial access, lateral movement, and collecting information. MFA can also be used to restrict access to cloud resources and APIs. |
| M1027 | Password Policies |
Implement and enforce strong password policies for domain accounts to ensure passwords are complex, unique, and regularly rotated. This reduces the likelihood of password guessing, credential stuffing, and other attack methods that rely on weak or static credentials. |
| M1026 | Privileged Account Management |
Audit domain account permission levels routinely to look for situations that could allow an adversary to gain wide access by obtaining credentials of a privileged account. Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled and use of accounts is segmented, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers. Limit credential overlap across systems to prevent access if account credentials are obtained. |
| M1018 | User Account Management |
Regularly review and manage domain accounts to ensure that only active, necessary accounts exist. Remove or disable inactive and unnecessary accounts to reduce the risk of adversaries abusing these accounts to gain unauthorized access or move laterally within the network. |
| M1017 | User Training |
Applications may send push notifications to verify a login as a form of multi-factor authentication (MFA). Train users to only accept valid push notifications and to report suspicious push notifications. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0210 | Abuse of Domain Accounts | AN0590 |
Detection of suspicious logon behavior using valid domain accounts across multiple hosts, off-hours, or simultaneous sessions from geographically distant locations. |
| AN0591 |
Use of domain accounts via sssd or winbind for logon activity outside of typical patterns, especially on sensitive systems or with lateral movement tools. |
||
| AN0592 |
Domain logins using network accounts or mobile accounts via Open Directory or Active Directory plugins, especially outside business hours or on atypical endpoints. |
||
| AN0593 |
Login to vSphere or ESXi hosts using domain accounts, especially those associated with vpxuser or unexpected group memberships. |