Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ghost SPN Attack Evades Detection in Cybersecurity

Ghost SPN Attack Evades Detection in Cybersecurity

Posted on March 26, 2026 By CWS

A new iteration of the Kerberoasting attack, known as the ‘Ghost SPN,’ has emerged, allowing cybercriminals to extract Active Directory credentials while evading detection. This novel method, identified by Trellix security experts, uses delegated administrative permissions to create temporary windows of vulnerability.

Understanding the Ghost SPN Technique

Kerberoasting is a well-known tactic targeting Active Directory accounts with Service Principal Names (SPNs). When attackers request a Ticket Granting Service (TGS) ticket for an SPN, the Kerberos Key Distribution Center encrypts it using the account’s NTLM hash, which can then be cracked offline.

The Ghost SPN attack advances this technique by exploiting delegated directory permissions to assign a fake SPN to a user account, transforming it into a temporary Kerberoasting target. This method bypasses traditional alerts as it does not involve known service accounts.

The Three Phases of the Attack

The Ghost SPN attack progresses through three distinct phases. Initially, attackers use write access to assign an arbitrary SPN to a target account, prompting the KDC to issue a TGS ticket without triggering protocol-level anomalies. Next, the TGS ticket is extracted and cracked offline, avoiding detection within the target infrastructure.

The final phase involves removing the SPN attribute, returning the account to its original state. This cleanup ensures no persistent indicators are left behind, complicating detection for defenders relying on static directory snapshots or low-fidelity logs.

Defensive Strategies and Mitigations

To counteract the Ghost SPN attack, organizations should conduct thorough audits of Access Control Lists (ACLs) to identify and revoke unnecessary permissions. Enabling detailed Active Directory change logging can help correlate SPN modifications with Kerberos ticket requests.

Transitioning to AES-only Kerberos encryption and resetting passwords for potentially compromised accounts are crucial steps. Additionally, deploying behavioral Network Detection and Response (NDR) tools can enhance detection of identity manipulation tactics.

As cyber attackers increasingly exploit legitimate directory permissions, defenders must pivot from monitoring access attempts to tracking identity attribute changes continuously. This shift is vital to counteract advanced tactics like the Ghost SPN attack, which blends seamlessly with legitimate administrative actions.

Stay informed with daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Active Directory, attack detection, cyber threats, Cybersecurity, Ghost SPN, hacking techniques, Kerberoasting, Kerberos, network defense, network security, SPN, Trellix

Post navigation

Previous Post: Infostealer Malware: Rapid Path to Dark Web Exposure
Next Post: Phishing Attack Exploits GitHub Alerts to Distribute Malware

Related Posts

17,000+ Fake News Websites Caught Promoting Investment Frauds 17,000+ Fake News Websites Caught Promoting Investment Frauds Cyber Security News
New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories Cyber Security News
Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Cyber Security News
New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages Cyber Security News
Critical Vulnerability in Ubuntu Allows Root Access Critical Vulnerability in Ubuntu Allows Root Access Cyber Security News
Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware
  • Phishing Attack Exploits GitHub Alerts to Distribute Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware
  • Phishing Attack Exploits GitHub Alerts to Distribute Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark