How to Investigate NTLM Brute Force Attacks

This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
Ed Lin
6 minute gelesen
Letzte aktualisierung 8. Dezember 2021

Objective

Malicious actors routinely use the NTLM authentication protocol to carry out account enumeration and brute force-styled attacks to compromise accounts within a victim’s network. Once inside, an attacker can gain persistence, exfiltrate sensitive data, and unleash ransomware.

In this post, we will cover the fundamentals of NTLM and its security flaws, as well as the workflow the Varonis IR Team uses to investigate these NTLM brute force attacks.

Get the Free Pen Testing Active Directory Environments EBook

“This really opened my eyes to AD security in a way defensive work never did.”

What is NTLM?

NTLM or “New Technology LAN Manager” is a protocol developed by Microsoft to authenticate users and computers on the network. It uses a challenge/response mechanism for authentication which allows users to prove their identities without sending a password over the network.

Despite being replaced by more secure authentication protocols and having multiple known vulnerabilities, NTLM is still widely deployed today because of its compatibility with legacy systems and applications.

What are Account Enumeration and Brute Force?

In general, brute force attacks involve using trial and error to work through possible user name and password combinations in order to compromise an account.

Account enumeration is a more specific type of brute force attack where the attacker is attempting to guess the valid usernames of users within a network. These attacks are typically done when the malicious actor has limited information about their victim’s network.

Depending on the complexity of the attack, the guessed username attempts could be something basic like “Admin” or “Guest” or more sophisticated like using the naming convention that is currently being utilized at the organization, e.g. “JSmith3”.

Additionally, if you or your organization has experienced a similar scenario, we recommend additional scrutiny when investigating as you may be more susceptible to future attacks.

Once a threat actor has successfully identified existing usernames, they will begin brute forcing those users to compromise their passwords and gain access to the network.  As a result, it is imperative to identify and remediate these account enumeration attacks in order to prevent a cyber attack in its beginning stages.

Detecting NTLM Brute Force Attacks with Varonis

There are several types of alerts that you can see in the Varonis Alert Dashboard or via email that may indicate that there is an ongoing NTLM Brute Force Attack.

Some of which include:

  • Password spraying attack from a single source
  • Account Enumeration Attack from a single source (using NTLM)
  • Lockout: Multiple account lockouts
  • Abnormal Behavior: an unusual amount of lockouts across end-user/service/admin accounts

Multiple account lock-out events alert in Varonis

You can also search for all failed authentication behavior in the Varonis Dashboard to look for suspicious activity that you want to investigate.

Varonis alerts

1. Preparing the Investigation in Varonis via the WebUI

Click “Analytics” in the Varonis Dashboard.

Select “DirectoryServices” in the Servers dropdown.

Filter for Authentication Events by typing “Account Authentication (TGT)” This will give you all the events related to attempted logins for the specified time.

Now search for all NTLM authentications that failed due to a bad username by adding “User Name (Event By) = Nobody (Abstract),” and “Authentication Protocol = NTLM

Varonis uses

Varonis uses “Abstract/Nobody” as a placeholder in the User Name column for usernames that do not exist in AD. By searching for events with “Abstract/Nobody,” you are effectively drilling down on all NTLM attempts that failed due to having an incorrect username.

Additionally, if you are seeing any of the previously mentioned alerts such as “Account Enumeration Attack from a single source (using NTLM),” you can view directly the related events that triggered this alert.

If you are not seeing any relevant alerts, please continue onto Step 2.

Click and open a new tab for alerts by clicking on the plus sign and selecting “Alerts”. Run a query searching for “Account Enumeration Attack from a single source (using NTLM)” or any of the related brute force alerts and click “Run Search”.

Action

Hover over “Actions” beneath the search bar and click “View all Related Events

Investigating the Events in Varonis via the WebUI

This will bring you to an audit log of all the related authentication attempts related to this specific alert.

2. Investigating the Events in Varonis via the WebUI

Now that you have the relevant events, there will be four columns that will be helpful during the investigation:

  • Event Description
  • Device Name
  • Event Time
  • Collection Device Hostname

Make sure they are present by clicking on “Attributes” and by searching for each of the column tiles in the newly opened window and selecting them

NTLM brute force

Within the event view, you are looking for failed logins for usernames that do not match your naming convention by using the “Event Description” column. Generic account names like “administrator,” “admin,” “root,” or “service,” can indicate a dictionary-style NTLM brute force attack.

Other examples of generic account names may be other simple names like “john,” “aaa,” and “test.”  You may even see usernames from foreign languages as well.

The “Device Name” may also be a spoofed device name from the attacker’s authentication requests.  Most likely, you won’t recognize these device names as these also will not follow your corporate naming conventions.

Attackers commonly use device names like “Windows10” or “mstsc” in an attempt to obfuscate their activity. Sometimes they’ll leave the device name entirely empty. Some of the most commonly spoofed device names include:

  • Rdesktop
  • Remmina
  • Freerdp
  • Windows7
  • Windows8
  • Windows2012
  • Windows2016
  • Windows2019

If you are seeing generic account names that do not match your naming convention in combination with spoofed or null device names, it is likely that your organization is being targeted by an account enumeration attack.

Add the spoofed device names to the search bar and select all monitored resources in the Server dropdown

Add the spoofed device names to the search bar and select all monitored resources in the Server dropdown.

immediate signs of account

By looking at all activity from the spoofed devices, you can determine if there are immediate signs of account compromise such as successful authentications.

You can also filter by all successful events from this suspicious device by clicking on the “Status” hyperlink on the left and selecting “Success” in the window that pops up. For example, account lockout events would be considered a successful event while the underlying failed authentications would not.

lockouts from these devices

Moreover, if there are lockouts from these devices or if there are multiple attempts to authenticate to actual usernames, it is highly likely that the attacker has successfully identified valid usernames and is now attempting to log in via password brute forcing.

successfully enumerated
We can assume that this admin account has been successfully enumerated by the attacker as a valid user since it has been locked out.

When an account is locked out due to an account enumeration attack, we highly recommend disabling this enumerated account and changing its password for a stronger one. Additionally, pivoting a search to look for all activity from these locked-out accounts could be a useful query as well.

Finally, take note of the “Collection Device Hostname” for these authentication attempts. This is the Domain Controller (DC) we need to prioritize during the next phase of the investigation. Since the device name is often spoofed or null, we will need to enable additional logging to identify the actual device being attacked.

3. Preparing NTLM auditing

In this section, we will focus on ensuring that the proper configurations are in place to capture the most helpful events for the investigation.

More specifically, you will need to use Event ID 8004 in Event Viewer to identify the actual device that is on the receiving end of these NTLM brute force attack attempts. Locating the victim device will be the first step in the remediation process.

8004 events are typically not enabled by default and may require configuration changes in specific Domain Controller group policies to enable logging.

Log in to a Domain Controller and open Group Policy Management Editor

Navigate to the Default Domain Controllers Policy and Right-Click to select Edit.

There are three security policies that we will need to configure

The Group Policy Management Editor will open. Navigate to Policies>Windows Settings>Security Settings>Local Policies” and select “Security Options.”

There are three security policies that we will need to configure:

  • Network security: Restrict NTLM: Audit Incoming Traffic = Enable auditing for all accounts
  • Network security: Restrict NTLM: Audit NTLM authentication in this domain = Enable all
  • Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers = Audit all

Change these values by right-clicking and selecting

Change these values by right-clicking and selecting “Properties” and then define the policy settings. Click Apply when finished.

Network security

 

Run “gpupdate /force” to apply these changes and begin collecting these events.

4. Investigating NTLM logs in Event Viewer

Navigate to the DC that you identified based on “Collection Device Hostname” in step 1.

Open Event Viewer and go to Application and Services Logs>Microsoft>Windows>NTLM>Operational.

Right-click and select “Properties”.

Storage

Expand the storage size of this log from the default 1MB to a larger size (we recommend 20MB as a starting point).

Function to search

You can now use Event ID 8004 events to investigate malicious authentication activity.

Use the Find function to search for the device name or user names we saw the attacker using in Step 1.

Once you are able to find an 8004 event that matches one of the malicious authentications events in the WebUI, use the “Secure Channel Name” field to identify the device the attacker is targeting.

Destination
In this screenshot, we see that the attacker’s device name was spoofed to be WINDOWS7 and that the destination device for these malicious authentications is DESKTOP2. 

5. Remediation

Once we identify the victim device, we can identify how the attacker is sending these authentication attempts. There are a few different sources of data that you can investigate:

  • Check firewall logs for connection activity that occurred at the same time as the authentication attempts.
  • Log on to the victim device and use tools such as Netstat or Wireshark (only do this if you see no indications of a successful suspicious authentication on that device!)

Attackers will use tools like Shodan to search for devices with publicly exposed ports, which is likely how they found this victim device in the first place.

You should identify the IP address and port the attacker is using to send the authentication requests. One port, in particular, RDP or port 3389 has been one of the most commonly targeted ports by threat actors, especially given the recent rise of remote workers.

After connecting to this targeting machin
After connecting to this targeting machine and running Netstat, we can see multiple established connections to the victim’s device by suspicious IPs over port 3389.

Once you have this information, you can take remediation actions such as blocking specific IPs from the firewall or closing certain ports.

For devices that are required to remain exposed to the internet, we recommend reducing the attack surface for malicious actors by:

  • Enabling MFA for all users
  • Disabling pre-built usernames like “Guest” and “Admin
  • Enforcing a strong password policy

However, it is important to note that if given enough attempts, threat actors can eventually make their way into a network as they narrow down their brute force attempts.

Finally, we recommend reviewing Varonis and NTLM logs to confirm these authentication attempts have stopped and continue to be on guard for new NTLM brute force attack activity.

Special thanks to Ian McIntyre, Ian Levy, and Raphael Kelly of the Varonis Incident Response Team for their contributions to this guide.

The Varonis IR Team provides free cybersecurity analysis and remediation to Varonis customers. Contact your Varonis Sales Team for details!

 

 

Wie soll ich vorgehen?

Im Folgenden finden Sie drei Möglichkeiten, wie Sie das Datenrisiko in Ihrem Unternehmen verringern können:

1

Vereinbaren Sie eine Demo mit uns, um Varonis in Aktion zu erleben. Wir passen die Session an die Datensicherheitsanforderungen Ihres Unternehmens an und beantworten alle Fragen.

2

Sehen Sie sich ein Beispiel unserer Datenrisikobewertung an und erfahren Sie, welche Risiken in Ihrer Umgebung lauern könnten. Varonis DRA ist völlig kostenlos und bietet einen klaren Weg zur automatischen Sanierung.

3

Folgen Sie uns auf LinkedIn, YouTubeund X (Twitter), um kurze Einblicke in alle Themen der Datensicherheit zu erhalten, einschließlich Data Security Posture Management (DSPM), Bedrohungserkennung, KI-Sicherheit und mehr.

Testen Sie Varonis gratis.

Detaillierte Zusammenfassung Ihrer Datensicherheitsrisiken
Umsetzbare Empfehlungen, die auf Ihre Bedürfnisse zugeschnitten sind
Ohne Bedingungen und Auflagen

Weiter lesen

Varonis bewältigt Hunderte von Anwendungsfällen und ist damit die ultimative Plattform, um Datenschutzverletzungen zu stoppen und Compliance sicherzustellen.

was-cios-von-snapchat-lernen-können:-die-top-3
Was CIOs von Snapchat lernen können: die Top 3
Snapchat ist eine der bei Mädchen im Teenageralter beliebtesten Apps für Mobilgeräte. Aber auch CIOs können am Beispiel von Snapchat noch einiges über Technik und Kommunikation lernen. 1. Daten mit...
von-juristen,-daten-und-stunden,-die-sich-verrechnen-lassen
Von Juristen, Daten und Stunden, die sich verrechnen lassen
Wenn man eine Zeit lang von Anwälten, Richtern und Legal Technologists umgeben ist, werden einem einige Fakten aus dem Rechtswesen verhältnismäßig schnell klar. Eines der obersten Gebote im Anwaltswesen ist...
active-directory-benutzer-und--computer-(active-directory-users-and-computers,-aduc):-installation-und-verwendung
Active-Directory-Benutzer und -Computer (Active Directory Users and Computers, ADUC): Installation und Verwendung
Active Directory Users and Computers (ADUC) ist ein MMC-Snap-In zur Verwaltung von Active Directory. Im Folgenden finden Sie weitere Details, Anwendungsfälle und Vorbehalte zu ADUC.
was-ist-ein-active-directory-forest-?
Was ist ein Active Directory Forest ?
Ein Active Directory Forest (AD Forest) ist ein Container auf der höchsten Organisationsebene einer Active Directory-Konfiguration, in der Domänen, Benutzer, Computer und Gruppen-Richtlinien enthalten sind. „Moment einmal!“, mögen Sie sagen....