Windows replay attack detected

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when a Windows replay attack is identified by the system.

Strategy

This detection monitors Windows event logs for Event ID 4649, which specifically indicates that a replay attack was detected by the security system. The event is generated when Windows identifies an authentication attempt using previously captured credentials or tickets.

A replay attack occurs when an attacker captures authentication traffic and later reuses (or “replays”) it to authenticate as the legitimate user, without needing to know their actual credentials. Windows systems can detect such attacks when timestamps or other indicators in the authentication data reveal that the information has been captured and replayed. This technique is commonly used in attempts to forge or reuse Kerberos tickets for unauthorized access.

Triage & Response

  • Identify the {{host}} where the replay attack was detected.
  • Review the event details to determine the targeted user account and source of the attack.
  • Check for successful authentication events following the replay attack.
  • Examine network logs to identify the source IP address and correlate with other suspicious activities.
  • Look for evidence of lateral movement from potentially compromised accounts.
  • Verify if the affected user account was involved in other suspicious activities.
  • Reset credentials for the targeted account if compromise is confirmed.
  • Review Kerberos security settings on domain controllers, particularly ticket lifetime and encryption.