RP0005: Theft of user certificate and private key
Summary
ID | RP0005 |
---|---|
Brief Description | Response playbook for "Theft of user certificate and private key" attack |
Author | @ERMACK_COMMUNITY |
Creation Date | 2023/05/31 |
Modification Date | 2023/06/06 |
Tags |
|
Usecases |
Description
Attackers can theft certificate and private key to authenticate on behalf of the certificate owner using Public Key Cryptography for Initial Authentication (PKINIT) Kerberos extension. Successful "Theft of user certificate and private key" attack quite dangerous, because attackers gets credentials alternative to the password
Workflow
-
Identify detected IOCs (tools, commands) used in certificate theft, for find specific artifacts. View the list of created and downloaded files to find stolen certificates or programs used in the attack. Search processes executed with "specific" flags. For example:
- processes started with args "dump", "exportPFX" or "certificates"
- process started with well-known flags: crypto::capi, crypto::certificates
-
Find domain account whose certificate were theft and host where these certificates were stored. If it is not possible to identify which certificates were stolen, consider revoking all certificates that are stored on the compromised host
- When you found account whose certificate were theft go to compromised active directory account response playbook
- When you found host where these certificates were stored go to windows host compromised response playbook
- On recovery stage, reissue revoked previously certificate
- Save all timestamps of implemented actions in Incident Report draft on the fly, it will save a lot of time
Response discovery mapping
ARTIFACT | RESPONSE ACTION | RESPONSE ACTION OBSERVABLES |
---|---|---|
Certificate | Find file by format Find .pfx, .cer, .pem and .der files on compromised host. |
Thefted certificates |
Process | Find process by executable content pattern Find tools used in the attack. |
Identified certificate theft tool |
Playbook Actions
Preparation
Identification
List Files Created
List Files Downloaded
Find File By Format
List Processes Executed
Find Process By Executable Content Pattern
Identify compromised data
Identify affected systems and users
Put Compromised Accounts On Monitoring
Containment
Block Process By Executable Content Pattern
Compromised active directory account
Windows host compromise
Eradication
Recovery
Lessons Learned
Develop Incident Report
Conduct Lessons Learned Exercise