Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using Valid Accounts.
Adversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-02 | Account Management | Protects | T1556 | Modify Authentication Process | |
AC-20 | Use of External Systems | Protects | T1556 | Modify Authentication Process | |
AC-03 | Access Enforcement | Protects | T1556 | Modify Authentication Process | |
AC-05 | Separation of Duties | Protects | T1556 | Modify Authentication Process | |
AC-06 | Least Privilege | Protects | T1556 | Modify Authentication Process | |
AC-07 | Unsuccessful Logon Attempts | Protects | T1556 | Modify Authentication Process | |
CA-07 | Continuous Monitoring | Protects | T1556 | Modify Authentication Process | |
CM-02 | Baseline Configuration | Protects | T1556 | Modify Authentication Process | |
CM-05 | Access Restrictions for Change | Protects | T1556 | Modify Authentication Process | |
CM-06 | Configuration Settings | Protects | T1556 | Modify Authentication Process | |
CM-07 | Least Functionality | Protects | T1556 | Modify Authentication Process | |
IA-02 | Identification and Authentication (organizational Users) | Protects | T1556 | Modify Authentication Process | |
IA-05 | Authenticator Management | Protects | T1556 | Modify Authentication Process | |
SC-39 | Process Isolation | Protects | T1556 | Modify Authentication Process | |
SI-04 | System Monitoring | Protects | T1556 | Modify Authentication Process | |
SI-07 | Software, Firmware, and Information Integrity | Protects | T1556 | Modify Authentication Process | |
PUR-AS-E5 | Audit Solutions | Technique Scores | T1556 | Modify Authentication Process |
Comments
Microsoft Purview auditing solutions provide an integrated solution to help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. Thousands of user and admin operations performed in dozens of Microsoft 365 services and solutions are captured, recorded, and retained in your organization's unified audit log. Audit records for these events are searchable by security ops, IT admins, insider risk teams, and compliance and legal investigators in your organization. This capability provides visibility into the activities performed across your Microsoft 365 organization.
Microsoft's Audit Solutions protects from Modify Authentication Process attacks due to Audit Solutions providing the visibility to allow admins to review authentication logs to ensure that mechanisms such as enforcement of MFA are functioning as intended.
License Requirements:
Microsoft 365 E3 and E5
References
|
ME-RBAC-E3 | Role Based Access Control | Technique Scores | T1556 | Modify Authentication Process |
Comments
The RBAC control can be used to limit cloud accounts with authentication modification relevant privileges, but does not provide protection against this technique's other sub-techniques or example procedures. Due to its Minimal coverage score, it receives a score of minimal.
License Requirements:
ME-ID Built-in Roles (Free)
References
|
ME-PIM-E5 | Privileged Identity Management | Technique Scores | T1556 | Modify Authentication Process |
Comments
The PIM control significantly protects against the modification of Multi-Factor Authentication by placing limitations and restrictions on relevant privileged accounts. However, this is overall Minimal coverage relative to the all the technique's sub-techniques.
License Requirements:
Microsoft Entra ID P2 or Microsoft Entra ID Governance
References
|
ME-IP-E5 | Identity Protection | Technique Scores | T1556 | Modify Authentication Process |
Comments
During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization.
Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated.
License Requirements:
Microsoft Entra ID P2
References
|
DEF-SECA-E3 | Security Alerts | Technique Scores | T1556 | Modify Authentication Process |
Comments
Microsoft Defender security alerts explain the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
Defender security alerts are divided into the following categories or phases, like the phases seen in a typical cyber-attack kill chain. Learn more about each phase, the alerts designed to detect each attack, and how to use the alerts to help protect your network using the following links:
Reconnaissance and discovery alerts
Persistence and privilege escalation alerts
Credential access alerts
Lateral movement alerts
Other alerts
License: A Microsoft 365 security product license entitles customer use
of Microsoft Defender XDR.
References
|
DEF-IR-E5 | Incident Response | Technique Scores | T1556 | Modify Authentication Process |
Comments
An incident in Microsoft Defender XDR is a collection of correlated alerts and associated data that make up the story of an attack. Microsoft 365 services and apps create alerts when they detect a suspicious or malicious event or activity. Individual alerts provide valuable clues about a completed or ongoing attack. Attacks typically employ various techniques against different types of entities, such as devices, users, and mailboxes. The result of this is multiple alerts for multiple entities in your tenant. Piecing the individual alerts together to gain insight into an attack can be challenging and time-consuming, Microsoft Defender XDR automatically aggregates the alerts and their associated information into an incident. A typical Incident Response workflow in Microsoft Defender XDR begins with a triage action, next is the investigate action, and finally is the response action.
Microsoft 365 Defender Incident Response responds to Modify Authentication Process attacks due to Incident Response monitoring for newly created files, suspicious modification of files, and newly constructed logon behavior across systems that share accounts.
License Requirements:
Microsoft Defender XDR
References
|
DO365-AG-E5 | App Governance | Technique Scores | T1556 | Modify Authentication Process |
Comments
App governance in Defender for Cloud Apps is a set of security and policy management capabilities designed for OAuth-enabled apps registered on Microsoft Entra ID, Google, and Salesforce. App governance delivers visibility, remediation, and governance into how these apps and their users access, use, and share sensitive data in Microsoft 365 and other cloud platforms through actionable insights and automated policy alerts and actions. App governance also enables you to see which user-installed OAuth applications have access to data on Microsoft 365, Google Workspace, and Salesforce. It tells you what permissions the apps have and which users have granted access to their accounts. App governance insights enable you to make informed decisions around blocking or restricting apps that present significant risk to your organization
App Governance Detects Modify Authentication attacks due to App Governance monitoring aggregated sign-in activity for each app and tracking all risky sign-in's.
License Requirements:
Microsoft Defender for Cloud Apps
References
|
DO365-ATH-E5 | Advanced Threat Hunting | Technique Scores | T1556 | Modify Authentication Process |
Comments
Advanced hunting is a query-based threat hunting tool that lets you explore up to 30 days of raw data. Advanced hunting in Microsoft Defender XDR allows you to proactively hunt for threats across: Devices managed by Microsoft Defender for Endpoint, Emails processed by Microsoft 365, Cloud app activities, authentication events, and domain controller activities. With this level of visibility, you can quickly hunt for threats that traverse sections of your network, including sophisticated intrusions that arrive on email or the web, elevate local privileges, acquire privileged domain credentials, and move laterally to across your devices. Advanced hunting supports two modes, guided and advanced. Users use advanced mode if they are comfortable using Kusto Query Language (KQL) to create queries from scratch.
Advanced Threat Hunting Detects Modify-Authentication Process attacks due to the IdentityLogonEvents table in the advanced hunting schema which contains information about all authentication activities related to Microsoft online services captured by Microsoft Defender for Cloud Apps.
License Requirements:
Microsoft Defender XDR, Microsoft Defender for Cloud Apps, Microsoft Defender for Office 365 plan 2
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1556.003 | Pluggable Authentication Modules | 12 |
T1556.002 | Password Filter DLL | 3 |
T1556.007 | Hybrid Identity | 7 |
T1556.008 | Network Provider DLL | 9 |
T1556.006 | Multi-Factor Authentication | 13 |
T1556.001 | Domain Controller Authentication | 15 |
T1556.005 | Reversible Encryption | 4 |
T1556.004 | Network Device Authentication | 13 |