{"id":123118,"date":"2022-10-05T09:00:00","date_gmt":"2022-10-05T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=123118"},"modified":"2024-05-02T10:22:03","modified_gmt":"2024-05-02T17:22:03","slug":"detecting-and-preventing-lsass-credential-dumping-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/05\/detecting-and-preventing-lsass-credential-dumping-attacks\/","title":{"rendered":"Detecting and preventing LSASS credential dumping attacks"},"content":{"rendered":"\n
Obtaining user operating system (OS) credentials from a targeted device is among threat actors\u2019 primary goals when launching attacks because these credentials serve as a gateway to various objectives they can achieve in their target organization\u2019s environment, such as lateral movement. One technique attackers use is targeting credentials in the Windows Local Security Authority Subsystem Service (LSASS) process memory because it can store not only a current user\u2019s OS credentials but also a domain admin\u2019s.<\/p>\n\n\n\n
LSASS credential dumping<\/a> was first observed in the tactics, techniques, and procedures (TTPs) of several sophisticated threat activity groups\u2014including actors that Microsoft tracks as HAFNIUM<\/a> and GALLIUM<\/a>\u2014 and has become prevalent even in the cybercrime space, especially with the rise of the ransomware as a service gig economy<\/a>. Detecting and stopping OS credential theft is therefore important because it can spell the difference between compromising or encrypting one device versus an entire network. Security solutions must provide specific measures and capabilities to help harden the LSASS process\u2014for example, Microsoft Defender for Endpoint<\/a> has advanced detections and a dedicated attack surface reduction rule<\/a> (ASR) to block credential stealing from LSASS.<\/p>\n\n\n\n In May 2022, Microsoft participated in an evaluation conducted by independent testing organization AV-Comparatives<\/a> specifically on detecting and blocking the LSASS credential dumping technique. The test, which evaluated several endpoint protection platforms (EPP) and endpoint detection and response (EDR) vendors, is the first time AV-Comparatives focused on a single attack technique, and we\u2019re happy to report that Defender for Endpoint passed all 15 test cases used to dump user OS credentials from the LSASS process, achieving 100% detection and prevention scores. Notably, we also passed all test cases with only Defender for Endpoint\u2019s default settings configured<\/strong>, that is, with LSASS ASR and Protective Process Light (PPL) turned off to validate our antivirus protection durability in itself. Such results demonstrate our continued commitment to provide organizations with industry-leading defense.<\/p>\n\n\n\n In this blog, we share examples of various threat actors that we\u2019ve recently observed using the LSASS credential dumping technique. We also provide details on the testing methodology done by AV-Comparatives, which they also shared in their blog<\/a> and detailed report<\/a>. Finally, we offer additional recommendations to further harden systems and prevent attackers from taking advantage of possible misconfigurations should they fail to leverage credential dumping.<\/p>\n\n\n\n Dumping LSASS credentials is important for attackers because if they successfully dump domain passwords, they can, for example, then use legitimate tools such as PsExec<\/em> or Windows Management Instrumentation (WMI) to move laterally across the network. They can also use techniques like pass-the-hash<\/a> for lateral movement if they manage to obtain the password hashes.<\/p>\n\n\n\n Microsoft researchers are constantly monitoring the threat landscape, including the different ways threat actors attempt to steal user credentials. The table below is a snapshot of the most popular credential theft techniques these actors used from March to August 2022 based on our threat data:<\/p>\n\n\n\nLSASS credential dumping: What we see in the wild<\/h2>\n\n\n\n