Brute Force Attack
Brute Force Attack
04 Brute-force attacks and why you should never let your guard down against them 5
Table of contents
05 A close look at the ransomware whose bedrock has been brute-force attacks 9
Intrusion 10
Creating a stronghold 10
Set up single sign-on (SSO) for your applications and secure it with 16
Enable MFA for virtual private network (VPN) logins, workstations, applications, 19
1 www.adselfserviceplus.com
01
Introduction
Active Directory (AD), the technology that lets IT administrators manage
permissions and access to network resources is a couple of decades old
now. Yet, organizations continue to build their IT infrastructure around it.
Because AD facilitates central management by tying together servers,
workstations, applications, and other network components in an IT
network, it's a key target for attackers. The volume of information stored in
AD attracts the attention of attackers, and its weak passwords make them
easy pickings.
This guide explores the various ways in which threat actors exploit poor
password security, and how you can thwart their plans. We will walk you
through how ManageEngine's solutions help you strengthen your password
management.
2 www.adselfserviceplus.com
02
Why are attackers after
AD credentials?
This explains why the bulk of cyberattacks today involve targeting
the employee credentials of the increasing number of remote
workers. 61% of all the attacks in 2021 involved credential data1. With
remote work, Active Directory platform has become more
vulnerable to attacks as it tries to serve the authentication request
from users who use their unsecured personal devices to connect to
corporate network and or use their home or other public
wifi-networks to establish a connection. Also, the number of cloud
applications and services organizations use are only growing and
enabling authentication for these services through AD is a priority
What is AD? Imagine a box filled with every computer, user, for many organizations. If the AD passwords in use are weak or are
application and service that runs in an organization's network. compromised passwords, then they put AD under great risk. These
That box is AD, a critical application because it stores large challenges have made AD more vulnerable than ever before.
identity-related information, including user permissions, configured properly, how easy it is for attackers to compromise
passwords, and devices in the network. accounts using just one technique and the various tools that they
use.
3 www.adselfserviceplus.com
03
How threat actors take over AD accounts
Yet, attackers have access to PowerShell functions like the
Get-GPPPassword, using which they can decrypt passwords. As you
can see, within a few steps, the adversaries can get hold of a local
admin account.
4 www.adselfserviceplus.com
04
Brute-force attacks
and why you should
never let your guard
down against them
In a brute force attack, attackers persistently pound an account with
multiple combinations of credentials until they can unlock it.
5 www.adselfserviceplus.com
Common types of brute-force attacks
6 www.adselfserviceplus.com
Popular tools used in brute-force attacks
Here are basic details, provided for educational purposes, about five NL Brute: A tool that's used in almost all Remote Desktop Protocol
popular open source tools used in brute-force attacks. (RDP) attacks. In particular, it's used to crack local accounts in the
system after the initial compromise.
7 www.adselfserviceplus.com
How botnets are used to carry out brute-force attacks
8 www.adselfserviceplus.com
05
How the Dharma ransomware
leverages brute-force attacks
The Dharma ransomware, a variant of the CrySIS malware, was first discovered in 2016. It
continues to be active even today due to its ability to intrude into victim's systems
through multiple vectors. Though it spread using phishing campaigns and malware
vulnerabilities in the beginning, RDP became it's most favored delivery vehicle.
Over 85% of all Dharma attacks3 conducted so far have exploited open RDP connections.
In most cases, attackers used brute-force techniques to barge in, while in others they
made use of leaked RDP credentials available from the dark web.
$2,000
Dharma has been thriving for so long due to the unique Ransomware-as-a-Service (RaaS)
model it's part of. Experienced malware developers create new variants of Dharma just by
making minimal changes to the source code such as changes to the encryption key used
in the attack or the message the ransomware note displays.
Security researchers say this strategy of not chopping and changing few things in the
source code is what makes it difficult to identity which threat group carried out a
particular Dharma attack, since there is no unique signature.
Dharma malware developers add a package of tools and best practices that affiliates can
follow and execute attacks without much hassle. Affiliates are mostly entry-level
cyberattackers. The package consists of prebuilt scripts and tools that leverage built-in
Windows tools, publicly available exploits, and third-party freeware tools all tied together
with PowerShell, batch, and AutoIT scripts.
9 www.adselfserviceplus.com
The key stages in a Dharma attack
Intrusion
Access to the target's device, and eventually the network, is mostly through exploitation of the open RDP ports- 3389. Simple brute-forcing or
password spraying is the usual tactic deployed. Attackers either take over a user workstation or, in some cases, the domain controller if they
can break into a domain admin's account. With the latter, they can affect multiple systems at once.
Creating a stronghold
Once the initial infection is complete, in most dharma attacks, attackers proceed to make entries in the Windows registry to enable persistence.
The Windows registry is a database that stores information used by the operating system and the programs in it. Details of the software
programs, hardware devices present, operating system configurations, everything can be found in the Windows registry.
10 www.adselfserviceplus.com
It doesn't stop there. To ensure maximum impact, attackers use more tools from their toolkit to brute-force into any local user accounts, get
access to passwords stored in encrypted files—NirSoft CredentialsFileView tool does the job for them—and attempt to compromise more
systems in the network.
Before executing the ransomware payload, any host backups and system logs present are erased, and existing services are halted, to ensure
the data parts of those services can also be encrypted. For instance, dharma ransomware attacks are known to terminate database services
such as sqlwriter, mssqlserver, sqlserveradhelper, to ensure data files that are in process by these services are also encrypted.
10010
1001010
1001011
EXE
All files in the host infected with the ransomware are encrypted using AES-256 combined with a RSA-1024 asymetric encryption. Only the
malware files and the system files are spared. Once the encryption is complete, a ransom note is left with two email addresses that the victim
can contact.
11 www.adselfserviceplus.com
06
5 steps you should take to protect
yourself from brute-force attacks
1. Enforce strong custom password policies
password best practices, like setting long and complex passwords, skipping passwords that are common dictionary words, and avoiding already
compromised passwords.
Includes numbers
Create a custom list of weak passwords which new password resets will be checked against
Prevents the use of breached passwords through an integration with the "Have I been Pwned?" service that checks passwords against a continuously
updated list of compromised passwords
12 www.adselfserviceplus.com
13 www.adselfserviceplus.com
2. Restrict users from reusing old passwords
54% of all employees reuse passwords for many of their work accounts, a recent survey4 by hardware authentication device manufacturer Yubico
revealed. Thanks to password reuse, attackers need to compromise only one pair of corporate credentials to sneak into your network.
14 www.adselfserviceplus.com
3. Set up single sign-on (SSO) for your applications and secure it with
multi-factor authentication (MFA)
In addition to internal applications, today's organizations use multiple cloud applications and services. SSO is crucial if you are looking to improve
user experience and identity security. With SSO, since employees need to remember only one pair of credentials, which in most cases is their AD
credentials, the danger of password reuse is averted. However, an SSO implementation without MFA does more harm than good from a security
standpoint as it only makes the job for attackers easier. All they have to do is compromise one account to gain access to all your applications.
15 www.adselfserviceplus.com
4. Enable MFA for virtual private network (VPN) logins, workstations,
applications, and self-service features
as they don't have access to the additional factor. the self-service password reset or account unlock
features only after their identity is verified.
One the best ways to protect your RDP connections from attacks
like the Dharma ransomware we saw earlier, is to grant RDP access
only through a VPN and further strengthen security by securing
the VPN access with MFA. Other steps to take are ensuring
unnecessary open RDP ports are locked down, periodically
reevaluating users who can RDP into the network, and keeping the
Network Level Authentication of your RDP server always ON.
16 www.adselfserviceplus.com
17 www.adselfserviceplus.com
5. Enhance security with contextual authentication
In today's remote-first organizational setup, the likelihood of a cyberattack is enormous. The context behind any login attempt, especially ones after
failed attempts or from an unknown location or device, should be examined and access should be provided only for those who don't pose any
security threat to the organization.
For example, in many RDP attacks, threat researchers found the RDP server under attack received a barrage of authentication requests either from IP
addresses that never connected to the network before, or from locations that the company didn't have employees in. Had there been a mechanism
to block such authentication requests, the attacks wouldn't have made it even to the second stage.
Password Self-service
Network Allow Full Access
18 www.adselfserviceplus.com
About ADSelfService Plus
ManageEngine ADSelfService Plus is a web-based self-service password
management and single sign-on solutions. It offers password self-service,
multi-factor authentication for endpoints, password expiration reminders, a
self-service directory updater, a multi-platform password synchronizer, and single
sign-on for applications. ADSelfService Plus also offers both Android and iOS mobile
apps to facilitate self-service for end users anywhere, at any time. ADSelfService Plus
supports IT help desks by reducing password reset tickets, and spares end users the
frustration caused by computer downtime. .......
Download Get a quote
Footnotes
2021 Data Breach Investigation Report
1
https://www.verizon.com/business/resources/reports/dbir/
2
2020 Data Breach Investigation Report
https://enterprise.verizon.com/content/verizonenterprise/us/en/index/resources/reports/2020-data-breach-investigations-report.pdf
3
Dharma ransomware attacks SMBs during COVID-19 pandemic
https://backendnews.net/dharma-ransomware-attacks-smbs-during-covid-19-pandemic/
4
Cybersecurity in the Work From Anywhere Era report https://pages.yubico.com/cybersecurity-in-the-work-from-home-era
19 www.adselfserviceplus.com