Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. 
Adversaries may gather private keys from compromised systems for use in authenticating to Remote Services like SSH or for use in decrypting other collected files such as email. Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, .pfx, .cer, .p7b, .asc. Adversaries may also look in common key directories, such as
~/.ssh for SSH keys on * nix-based systems or
C:\Users(username).ssh\ on Windows.
|Audit||Ensure only authorized keys are allowed access to critical resources and audit access lists regularly.|
|Encrypt Sensitive Information||When possible, store keys on separate cryptographic hardware instead of on the local system.|
|Network Segmentation||Use separate infrastructure for managing critical systems to prevent overlap of credentials and permissions on systems that could be used as vectors for lateral movement.|
|Password Policies||Use strong passphrases for private keys to make cracking difficult.|
|Restrict File and Directory Permissions||Ensure permissions are properly set on folders containing sensitive private keys to prevent unintended access.|
|Ebury||Ebury has intercepted unencrypted private keys as well as private key pass-phrases. |
Empire can use modules like
|jRAT||jRAT can steal keys for VPNs and cryptocurrency wallets. |
Monitor access to files and directories related to cryptographic keys and certificates as a means for potentially detecting access patterns that may indicate collection and exfiltration activity. Collect authentication logs and look for potentially abnormal activity that may indicate improper use of keys or certificates for remote authentication.
- Wikipedia. (2017, June 29). Public-key cryptography. Retrieved July 5, 2017.
- Kaspersky Labs. (2014, February 11). Unveiling “Careto” - The Masked APT. Retrieved July 5, 2017.
- Bar, T., Conant, S., Efraim, L. (2016, June 28). Prince of Persia – Game Over. Retrieved July 5, 2017.
- Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.