purple team
Fix first: the cyber Remediation reimagined podcast

The Purple Team Chronicles - Episode 3: Shadow in the hall – lateral movement unleashed

Katie: Welcome to the deep dive. So let's set the scene. An attacker manages to breach your network perimeter. Maybe through some clever phishing, maybe an exploit.

James: Right. But then your security team, the blue team, they spot it. They manage to shut down that initial access point.

Katie: Phew. Crisis averted. Game over for the attacker, you'd think.

James: Well, not usually. Not if they're determined. See, that initial foothold, even if it crumbles quickly, might be enough. If they grab something useful on the way out.

Katie: Like credentials.

James: Exactly. The next logical step, almost always, is trying to move sideways. Lateral movement. Trying to find another way in or, you know, get closer to the real prize.

Katie: And that's precisely what we're diving into today. We've got this really great source. It's basically a narrative, like a play-by-play, of a red team versus blue team exercise.

James: It shows exactly how attackers maneuver inside a network after that initial breach gets stopped, the specific tactics they use.

Katie: And just as importantly, how defenders can actually spot and counter these moves. So our mission today is really to unpack that crucial middle phase of an attack.

James: What happens after they're technically in, but maybe lost their first connection? How do they navigate? How do you as a defender stop them before they hit the crown jewels?

Katie: Right. And the source material picks up right at that moment. The red team got in, the blue team blocked them using behavioral detection, rolled back the damage.

James: But, and this is the key bit from the source, the initial foothold may have crumbled, but he had credentials. That's where our story really begins.

Katie: The door slammed shut, but they'd already pocketed a key. So, okay, the attacker's blocked, but they have credentials. What's their immediate goal now, according to this scenario?

James: Priority number one is usually using those credentials, especially if they look promising, to get onto other systems. It's about expanding that foothold or escalating privileges.

Katie: And the source says they went straight for credential dumping.

James: Yep. Specifically targeting the local security authority's subsystem service. You know, LSAS.

Katie: Ah yes, LSAS. That's a fundamental Windows process, isn't it? Yeah. Why is it such a magnet for attackers?

James: It really is fundamental. It handles security policies, logins, authentication tokens. And crucially, for legitimate reasons like single sign-on, it often caches credentials, including password hashes, in its memory.

Katie: OK, so it's holding the keys to the kingdom, potentially, right there in memory.

James: Pretty much. Which makes dumping its memory contents. That's MITRE technique T1003.001 OS credential dumping a go-to tactic.

Katie: And the narrative mentions the specific tool they used.

James: It does. Mimikatz. It's notorious. Really built for exactly this kind of thing. Interacting with Windows security. Pulling secrets out of memory like LSAS.

Katie: So they run Mimikatz?

James: Yeah.

Katie: The source even gives the command structure they use, right? Something like sicrlsa.logonpasswords.

James: Yeah, basically telling Mimikatz, get debug privileges, then show me the credentials from the current logon sessions stored in LSAS.

Katie: OK, so Mimikatz runs, it digs into LSAS.

James: Yeah.

Katie: What did they find? What was the prize here?

James: The jackpot, basically. They snagged the NTLM hash for a privileged domain administrator account.

Katie: Wow. OK. And the source makes a big point here. They didn't need the actual password, just the hash was enough.

James: Exactly. That's super important. You don't always need to crack the password, which can be, you know, really hard or take ages. The hash itself can be used directly.

Katie: How does that work? Why is just the hash good enough?

James: That leads to the next tactic they used, pass the hash. It's MITR T1550.002 using alternate authentication material. So instead of cracking the hash to get the password, the attacker takes the stolen and TLM hash and presents it directly to another machine on the network for authentication.

Katie: And the target machine, it just accepts the hash as proof of identity without seeing the original password.

James: If the system uses NTLM authentication, then often yes, it validates the hash itself. The attacker used another Mimikatz command for this, the socral sa.pifit command.

Katie: So they're essentially saying, use this user's hash to log me into that other server over there.

James: Precisely. Here's the user, the domain, the NTLM hash, now run me a command shell on that target system.

Katie: And the result for the attacker. Did it work?

James: Instantly.

Katie: Yeah.

James: They got a command shell running on a different server and not just any access they were running as the domain admin.

Katie: Whoa. So from being blocked on one machine, they used a stolen hash to jump straight to domain admin rights on another critical server.

James: That's the power of Pass the Hash when it works. It's fast. It often bypasses traditional antivirus because you're not using malware. Just legitimate authentication mechanisms in a malicious way.

Katie: And the narrative really captures that moment, doesn't it? The red team lead thinks something like, you closed one door, Michelle, but you left the hallways wide open.

James: Yeah, it perfectly frames that shift. Initial access might be contained, but the internal network, the hallways, are now the playground if they have credentials.

Katie: It shows that containment isn't victory if the attacker managed to grab something valuable during that brief initial access.

James: Right. It's not about just getting in. It's about what you can achieve once you are in, even for a moment.

Katie: Yeah.

James: Steal credentials and you've just bought yourself more time and options.

Katie: Okay, fascinating. Let's flip perspectives now. While the red team is happily popping shells as domain admin on a new server, what about the blue team? How did Michelle, the lead defender in this story, pick up on this?

James: Well, it wasn't a traditional malware alert, obviously. The detection came from their security platform. The source mentions vicarious VRX flagging suspicious behavior.

Katie: Behavior, not signatures. Okay, what specific behavior raised the alarm?

James: The platform's telemetry noticed something really odd. Remember that first machine, VM3478, the one they'd just quarantined? Yeah. It suddenly started making SMB requests that's network file sharing traffic to other servers on the network that had no business talking to, especially not from quarantine.

Katie: Ah, OK. Traffic coming from a known bad, supposedly isolated host. That's definitely a red flag. What else?

James: That was the trigger. But the real key was correlating that traffic with other data points. Specifically, event logs on the target servers.

Katie: What did the logs show?

James: They showed login attempts, anomalous authentications, using that exact same domain admin account whose hash had just been stolen. And crucially, the source notes this admin account hadn't been used in months.

Katie: Wow, okay. So suspicious traffic from the quarantine box, trying to log into other boxes, using a dormant high-privilege account, that's putting the pieces together.

James: Exactly, it's connecting those dots. The security platform did this correlation and generated a specific alert, something like, potential lateral movement detected. Privileged account used from isolated host VM3478 by tret1550.002.

Katie: that's incredibly specific. It names the likely tactic past the hash and points right back to the compromised machine. That must help the defender react much faster.

James: Absolutely. It tells you what is likely happening and where it originated. So Michelle didn't just rely on the alert. She started digging to verify.

Katie: What did she do?

James: The narrative says she pulled security logs from the target servers, looking specifically for those logon events, event ID 4624, to confirm the source IP and the account used. She also checked the configuration of the original compromised machine.

Katie: Checking its defenses.

James: Yeah, specifically looking to see if protections against credential dumping, like LSA protection, were enabled. The source shows her using a reg query command for that.

Katie: and putting all that evidence together.

James: Her conclusion was clear. This wasn't random noise. It was active credential misuse. The attacker was using the stolen admin hash to pivot across the network.

Katie: Okay, so we have this critical moment. Red team using pass the hash to expand access. Blue team detecting the anomalous behavior and confirming credential misuse. Let's quickly summarize those moves side by side.

James: Sure. Red team dumped LS, got the NTLM hash, used past the hash via Mimikatz gained domain admin shell on a new server. They established a second beachhead and the blue team detected the weird SMB traffic from the quarantine host, correlated it with logon events showing the dormant admin account trying to authenticate elsewhere, confirmed the likely tactic was past the hash and started deploying a countermeasure, which was enabling LSA protection.

Katie: Right. Let's talk about that. How does enabling LSA protection actually stop this kind of attack? What does it do?

James: It's a hardening feature in Windows. When you enable LSA protection, often called Run-S PPL, you basically tell the operating system to shield the LSAS process memory.

Katie: Shield it from what?

James: From being read by other processes unless they have very specific high privileges. It makes it significantly harder for tools like Mimikatz to just reach in and dump the credentials stored there.

Katie: Ah, so it targets the source of the problem. It stops the credential theft in the first place.

James: Exactly. You cut off the supply of hashes that the attacker needs for techniques like pass the hash. The source even shows the command rig add to set the run SPPL registry key.

Katie: So, Michelle is hardening the systems. How did the security platform itself, the VRX mentioned, help her close the hall, as the attacker put it?

James: The source highlights a few ways it helped beyond just the initial alert. First, it was not just looking at single events in isolation. It recognized the pattern of that specific admin credential being reused suspiciously across different systems. That behavioral context is key.

Katie: seeing the bigger picture, not just the individual login attempt.

James: Right. Second, and this is pretty powerful, according to the narrative, the platform didn't just alert Michelle, it actively blocked those malicious authentication attempts using the reused hash.

Katie: Wait, block them? Even if the hash was technically correct?

James: Yes. Based on the contest originating from the quarantined host, using a dormant admin account in a way flagged as lateral movement, the system was configured to deny the authentication, preventing the attacker from establishing those new sessions.

Katie: That's proactive defense based on behavior, not just waiting for an analyst to react. That's a big deal.

James: It really is. And third, the platform allowed Michelle to automatically enforce hardening policies like enabling that LSA protection setting across potentially thousands of endpoints quickly.

Katie: So she could roll out that protection measure system wide from a central point.

James: Exactly. Detect the threat, block the immediate attempts, and then rapidly deploy hardening to prevent recurrence elsewhere. That's how you start to actually contain and shut down this kind of lateral movement.

Katie: Detection, correlation, behavioral blocking, and automated hardening. It sounds like a layered approach targeting the attacker's techniques after they get inside.

James: It has to be. Focusing only on the perimeter, on preventing that very first breach, isn't enough anymore. You have to assume they might get in, and you need visibility and control over what they do next inside your network.

Katie: This scenario feels very plausible. Does the source connect these specific red team tactics, the LSAS dumping, the pass the hash to real world attacks?

James: Oh, absolutely. It explicitly states that these are not just theoretical exercise techniques. These are staples used by sophisticated real world threat actors. It names groups like APT-29, also known as Cozy Bear, and FIN-7, a notorious cybercrime group.

Katie: So the techniques we just walked through are actively being used by major threat groups out there right now.

James: Day in, day out. And the source brings up another really critical, almost chilling point.

Katie: Which is?

James: Often these lateral movement phases involve no malware, zero malicious files dropped on the target systems.

Katie: How is that possible?

James: Because they're living off the land. They use tools like Mimicats, which might just run in memory. And then they use built-in Windows protocols like NTLM and tools like PowerShell or WMI for movement and execution.

Katie: So traditional antivirus or signature-based tools, they might not see anything wrong.

James: They're often completely blind to it. They're looking for known bad files, but the attacker is using legitimate system functions. It looks like normal admin activity just initiated by the wrong person.

Katie: which highlights why speed is so crucial for the defender. By the time a traditional tool might flag something, if it ever does.

James: The attacker could already be several steps ahead, deeper in the network, potentially with domain dominance like Alex achieved on that second server. Time is absolutely critical. Detecting the behavior of credential misuse in near real time is key.

Katie: and responding quickly, ideally with some automation, to break that chain before they pivot further.

James: Exactly.

Katie: OK. This has been a fantastic deep dive into this scenario. If we boil it down, what are the absolute key takeaways you should remember from this?

James: Well, first, I'd say NTLM hashes are incredibly valuable. Don't underestimate them. Attackers can use them without the password.

Katie: Right. Second takeaway.

James: Pass the hashes alive and well. It's still a dominant tactic for moving laterally once an attacker has credentials. You need defenses against it.

Katie: Makes sense. Third.

James: Protecting credentials in memory is non-negotiable. If you're not actively hardening things like LSAS, you're leaving the door open for credential theft and making lateral movement much, much easier for attackers.

Katie: OK, hashes are gold. Pass the hash works. Protect LSAS. What's the final big one?

James: You can't even just rely on signatures anymore, especially for post-compromise activity. You absolutely need behavioral detection. You need tools that can correlate events across your network, spot the patterns of misuse, and ideally block or help you respond in real time. It's about how things are happening, not just what files are there.

Katie: Understanding the context, the sequence of events, the deviation from normal.

James: Precisely. That correlation, the weird traffic from the bad host, combined with the Dorman admin account suddenly active, that's the signal and the noise.

Katie: So we've journeyed through this slice of a cyber attack, watching the attacker pivot using stolen credentials and seeing how a defender, using smart tools and insights, can actually detect and disrupt that movement.

James: And understanding these steps, both attack and defense, is really fundamental if you're trying to navigate the security landscape today. Attackers are clever. They use built-in tools. They live off the land.

Katie: Absolutely. And this narrative we've been following actually ends with a bit of a tease pointing towards an even more dangerous scenario. It leaves you with a really provocative question to ponder. What happens when an attacker moves beyond stealing existing credentials and manages to forge their own master keys? Things like golden tickets, skeleton keys that give them persistent, almost undetectable access to everything in your domain.

James: Yeah, that's the end game for many advanced attackers. Achieving that kind of domain dominance where they effectively own the authentication system itself. If they get there, how do you even begin to fight back? How do you evict them?

Katie: A truly sobering thought for anyone in defense. Definitely something to think about. Thanks for joining us on this deep dive.

James: My pleasure. Always fascinating to unpack these scenarios.

1000+ members

Turn security converstains into remediation actions