Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ghost SPN Attack Evades Detection in Cybersecurity

Ghost SPN Attack Evades Detection in Cybersecurity

Posted on March 26, 2026 By CWS

A new iteration of the Kerberoasting attack, known as the ‘Ghost SPN,’ has emerged, allowing cybercriminals to extract Active Directory credentials while evading detection. This novel method, identified by Trellix security experts, uses delegated administrative permissions to create temporary windows of vulnerability.

Understanding the Ghost SPN Technique

Kerberoasting is a well-known tactic targeting Active Directory accounts with Service Principal Names (SPNs). When attackers request a Ticket Granting Service (TGS) ticket for an SPN, the Kerberos Key Distribution Center encrypts it using the account’s NTLM hash, which can then be cracked offline.

The Ghost SPN attack advances this technique by exploiting delegated directory permissions to assign a fake SPN to a user account, transforming it into a temporary Kerberoasting target. This method bypasses traditional alerts as it does not involve known service accounts.

The Three Phases of the Attack

The Ghost SPN attack progresses through three distinct phases. Initially, attackers use write access to assign an arbitrary SPN to a target account, prompting the KDC to issue a TGS ticket without triggering protocol-level anomalies. Next, the TGS ticket is extracted and cracked offline, avoiding detection within the target infrastructure.

The final phase involves removing the SPN attribute, returning the account to its original state. This cleanup ensures no persistent indicators are left behind, complicating detection for defenders relying on static directory snapshots or low-fidelity logs.

Defensive Strategies and Mitigations

To counteract the Ghost SPN attack, organizations should conduct thorough audits of Access Control Lists (ACLs) to identify and revoke unnecessary permissions. Enabling detailed Active Directory change logging can help correlate SPN modifications with Kerberos ticket requests.

Transitioning to AES-only Kerberos encryption and resetting passwords for potentially compromised accounts are crucial steps. Additionally, deploying behavioral Network Detection and Response (NDR) tools can enhance detection of identity manipulation tactics.

As cyber attackers increasingly exploit legitimate directory permissions, defenders must pivot from monitoring access attempts to tracking identity attribute changes continuously. This shift is vital to counteract advanced tactics like the Ghost SPN attack, which blends seamlessly with legitimate administrative actions.

Stay informed with daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Active Directory, attack detection, cyber threats, Cybersecurity, Ghost SPN, hacking techniques, Kerberoasting, Kerberos, network defense, network security, SPN, Trellix

Post navigation

Previous Post: Infostealer Malware: Rapid Path to Dark Web Exposure
Next Post: Phishing Attack Exploits GitHub Alerts to Distribute Malware

Related Posts

WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data Cyber Security News
Critical Vulnerabilities Patched in Next.js and React Critical Vulnerabilities Patched in Next.js and React Cyber Security News
Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges Cyber Security News
Hidden Malware in Open VSX Extension Threatens Developers Hidden Malware in Open VSX Extension Threatens Developers Cyber Security News
New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages Cyber Security News
Muddled Libra Exploits VMware vSphere in Cyber Attack Muddled Libra Exploits VMware vSphere in Cyber Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark