BD Platform
Security Operations, Accelerated.
Privilege escalation is just a formal way of describing when an attacker gains more permissions on a computer they have broken into, which then gives them the ability steal more information or do more damage. To understand why this is important, consider this analogy: a criminal breaks into a bank branch office at night, disabling the alarm and slipping in through a window without being detected – if that break-in represents initial access, then the next step of breaking into the vault is privilege escalation. While not all computer intrusions require privilege escalation to achieve the attacker’s goals, most of the most serious and damaging intrusions do need to escalate privileges in order to move the attack from a single employee workstation to critical servers, sensitive systems, and widespread deployment across all the employee workstations.
There are several completely different scenarios that can all be called “privilege escalation” but we’ll focus on the most common scenarios that you are likely to encounter. First, it is important to understand that there’s a difference between being a “local administrator” on an individual computer versus being a “Domain Administrator” (or worse, an all-powerful “Enterprise Administrator” over multiple domains).
In either scenario, once the attacker has local computer administrator or SYSTEM level privileges, it’s just a matter of time before a Domain Administrator account logs in to the computer. Oftentimes, intruders will purposefully cause some minor system glitch to occur that will annoy the employee using the workstation and cause them to ask IT support for help. The IT support personnel will most likely log into the computer remotely using a Domain Administrator account, which puts a hash, token, or password into memory. Please note that Windows 10 supports mitigations to protect against these types of attacks, such as Credential Guard, which should be enabled. Using Group Policy to restrict SeDebugPrivilege is another best practice to help defend against these types of attacks.
Attackers often use tools such as Bloodhound to find the shortest path to a user account that has Domain Administrator privileges, especially if there are Service Accounts (non-user accounts with fixed, non-expiring passwords) that have higher privileges in the domain. A good technique for defenders is to detect the telltale signs of Bloodhound being run on the domain by monitoring LDAP queries and other signals to alert defenders. Surprisingly, attackers often download Bloodhound into files and folders named “Bloodhound”--that’s another easy thing to monitor if defenders have visibility into file events on endpoints.
The most dangerous situation is once the intruder gets access to a Domain Administrator account. They might add another Domain Administrator or promote an existing user to Domain Administrator in order to maintain control, or they might just continue to use an existing account for which they have stolen the plaintext password. It’s important to monitor security events to investigate whenever a new account is added to the Domain Administrators group.
In conclusion, privilege escalation is a commonly-used attacker technique that is very important to monitor for and investigate whenever it happens. Of course, there are legitimate use cases for escalation of privileges–administrators use this technique all the time. But when a user account that doesn’t normally have any reason to become an administrator starts launching programs with administrator level access, defenders must be on guard and respond quickly to investigate. If they don’t, it’s like letting the bank robber take as much time as they like with the vault open–you can bet they won’t waste that opportunity!