Operations

3/4/2016
02:45 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials

SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.

SAN FRANCISCO, CALIF. – RSA Conference 2016 – Researchers with Dell SecureWorks here this week released an open-source homegrown tool that detects when attackers attempt to steal Windows Active Directory domain administrator credentials.

The so-called DCEPT (Domain Controller Enticing Password Tripwire) tool is basically a deception-style “honeytoken” approach to catch the bad guys in the act of scraping domain credentials: it uses phony usernames and passwords for the domain administrator and an intrusion detection mechanism that goes into effect when the attacker takes the bait.

James Bettke, a security researcher with SecureWorks who along with director of malware research Joe Stewart co-wrote the tool, says they were looking to solve the domain credential theft problem that plagues organizations hit by advanced attacks such as cyber espionage. “We wrote an agent component caching fake credentials... and a second component looks for their use on the network,” Bettke says. “We thought, ‘why not release it as open source?’”

Pilfered network administrator credentials are a popular way for attackers to pivot from an infected user machine to full access to the victim organization’s network and servers, and ultimately, their sensitive data. Attackers typically scrape the credentials from system memory, and use those keys to the kingdom to burrow further into the network and steal information.

“They try to scrape additional credentials out of memory, looking for the domain password. If they get that out of memory, they go from being an intruder on a single system to controlling your entire network,” Bettke says. “We thought, wouldn’t it be cool to detect that.”

DCEPT works like this: it places phony credentials on the network as a lure. So if an attacker tries to pull cached credentials from a server, DCEPT detects the activity and then alerts a SIEM or other monitoring mechanism. DCEPT comes as a Docker container build for its server component, Stewart says.

The tool decrypts Kerberos pre-authentication packets and inspects them to see if they were the fake passwords being used in the network. Bettke says the tool could be expanded to support other types of “tripwires” such as database entries or email addresses.

DCEPT, which is available on GitHub, has three components: an agent that places fake credentials into memory (and refreshes them); a generation server that creates random passwords for the lure; and a sniffer, which searches for and detects abuse of the phony credentials.

Related Content:

 

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
3/11/2016 | 12:20:28 PM
Re: Poking the bear
It's definitely not for every organization, but deception-based technology is gradually becoming more palatable and strategic for orgs that have the resources to handle it. 
RyanSepe
0%
100%
RyanSepe,
User Rank: Ninja
3/7/2016 | 9:22:22 AM
Poking the bear
I do have some hesitations with this method however and honeypots/nets in general. Network scraping/memory scraping is common practice and more often than not a company knows or should know whether they are equipped to combat it or if they are vulnerable. Once the attacker discovers the credentials rendered are phony it might sway them to target the ip space they were scrapping more heavily then before. Mind you, unless targeting, they may have been doing this to a myriad of ip spaces trying to get lucky.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
3/7/2016 | 9:19:10 AM
Interesting
I did not expect the expansion of honeypot principles into a token based concept. It would be interesting to identify by what means your network is being scraped for those credentials when there is less of a risk because they are phony.
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7682
PUBLISHED: 2018-06-22
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
CVE-2018-12689
PUBLISHED: 2018-06-22
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.