The Kerberos Account Scan detection identifies attempts to query the Kerberos authentication service for valid user accounts. This activity is often a precursor to credential harvesting attacks, such as Kerberoasting, where attackers aim to extract Kerberos tickets for offline brute-force attacks or dictionary attacks to crack passwords.
Scenario 1: An internal host generates a high volume of Kerberos TGS-REQs targeting various SPNs. Investigation reveals that the host is compromised, and the attacker is attempting to gather Kerberos tickets for offline password cracking.
Scenario 2: A spike in Kerberos Pre-authentication failures is detected, originating from an IP address associated with a network security assessment. Verification with the IT department confirms that the activity is part of a scheduled security test.
If this detection indicates a genuine threat, the organization faces significant risks:
Successful enumeration and extraction of Kerberos tickets can lead to the compromise of user credentials and unauthorized access to sensitive data.
Attackers can use compromised credentials to move laterally within the network, escalating privileges and accessing critical resources.
Unauthorized scanning and enumeration of accounts can trigger account lockouts, disrupting legitimate access and affecting business operations.
Examine Kerberos authentication logs for patterns of high-volume requests, pre-authentication failures, and TGS-REQ activities. Focus on identifying the source of the scan.
Determine the internal host or external entity generating the Kerberos account scan traffic. Verify if the host and user are authorized to perform such actions.
Look for other signs of compromise or related suspicious behavior, such as unusual login attempts, malware alerts, or unauthorized access attempts.
Confirm if any authorized security assessments, penetration tests, or administrative tasks could explain the detected Kerberos scanning activity.