Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ghost SPN Attack Evades Detection in Cybersecurity

Ghost SPN Attack Evades Detection in Cybersecurity

Posted on March 26, 2026 By CWS

A new iteration of the Kerberoasting attack, known as the ‘Ghost SPN,’ has emerged, allowing cybercriminals to extract Active Directory credentials while evading detection. This novel method, identified by Trellix security experts, uses delegated administrative permissions to create temporary windows of vulnerability.

Understanding the Ghost SPN Technique

Kerberoasting is a well-known tactic targeting Active Directory accounts with Service Principal Names (SPNs). When attackers request a Ticket Granting Service (TGS) ticket for an SPN, the Kerberos Key Distribution Center encrypts it using the account’s NTLM hash, which can then be cracked offline.

The Ghost SPN attack advances this technique by exploiting delegated directory permissions to assign a fake SPN to a user account, transforming it into a temporary Kerberoasting target. This method bypasses traditional alerts as it does not involve known service accounts.

The Three Phases of the Attack

The Ghost SPN attack progresses through three distinct phases. Initially, attackers use write access to assign an arbitrary SPN to a target account, prompting the KDC to issue a TGS ticket without triggering protocol-level anomalies. Next, the TGS ticket is extracted and cracked offline, avoiding detection within the target infrastructure.

The final phase involves removing the SPN attribute, returning the account to its original state. This cleanup ensures no persistent indicators are left behind, complicating detection for defenders relying on static directory snapshots or low-fidelity logs.

Defensive Strategies and Mitigations

To counteract the Ghost SPN attack, organizations should conduct thorough audits of Access Control Lists (ACLs) to identify and revoke unnecessary permissions. Enabling detailed Active Directory change logging can help correlate SPN modifications with Kerberos ticket requests.

Transitioning to AES-only Kerberos encryption and resetting passwords for potentially compromised accounts are crucial steps. Additionally, deploying behavioral Network Detection and Response (NDR) tools can enhance detection of identity manipulation tactics.

As cyber attackers increasingly exploit legitimate directory permissions, defenders must pivot from monitoring access attempts to tracking identity attribute changes continuously. This shift is vital to counteract advanced tactics like the Ghost SPN attack, which blends seamlessly with legitimate administrative actions.

Stay informed with daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Active Directory, attack detection, cyber threats, Cybersecurity, Ghost SPN, hacking techniques, Kerberoasting, Kerberos, network defense, network security, SPN, Trellix

Post navigation

Previous Post: Infostealer Malware: Rapid Path to Dark Web Exposure
Next Post: Phishing Attack Exploits GitHub Alerts to Distribute Malware

Related Posts

RenEngine Loader Bypasses Security with Multi-Stage Attack RenEngine Loader Bypasses Security with Multi-Stage Attack Cyber Security News
Claude Code Introduces Remote Terminal Control via Mobile Claude Code Introduces Remote Terminal Control via Mobile Cyber Security News
Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News
AI Vulnerability Exposed Through Custom Font Attacks AI Vulnerability Exposed Through Custom Font Attacks Cyber Security News
GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Entra ID Enhances MFA with New Feature
  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Entra ID Enhances MFA with New Feature
  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark