Ghost SPN Attack Lets Hackers Conduct Stealthy Kerberoasting Under the Radar

By Published On: March 26, 2026

Unmasking Ghost SPN: The Silent Threat Evading Kerberoasting Detection

In the complex landscape of Active Directory security, new attack vectors constantly emerge, challenging even the most vigilant defenders. One such sophisticated evolution, recently brought to light by Trellix security researchers, is the “Ghost SPN” attack. This stealthy tactic represents a significant bypass of traditional Kerberoasting detection methods, allowing threat actors to extract sensitive Active Directory credentials with unprecedented covertness. For IT professionals, security analysts, and developers responsible for safeguarding their organizations, understanding Ghost SPN is no longer optional – it’s imperative.

What is Kerberoasting? A Brief Refresher

Before diving into the intricacies of Ghost SPN, it’s essential to grasp the fundamentals of Kerberoasting. Kerberoasting is a well-documented post-exploitation technique used by adversaries to obtain service account credentials. In essence, attackers query Active Directory for Service Principal Names (SPNs) associated with user accounts, not computer accounts. When an organization registers an SPN for a service running under a user account, Active Directory creates a Kerberos service ticket containing a NTLM hash of that user account’s password. Attackers can then request this ticket, extract the hash, and attempt to crack it offline using tools like hashcat or John the Ripper. If successful, they gain the plaintext password for a service account, often leading to elevated privileges.

The Evolution: How Ghost SPN Elevates the Threat

The Ghost SPN attack, as described in the Cyber Security News article, takes Kerberoasting to a new, more dangerous level. Rather than simply querying for existing SPNs, Ghost SPN leverages delegated administrative permissions to create a temporary, malicious exposure window. Here’s how it fundamentally differs and why it’s so difficult to detect:

  • Temporary SPN Creation: Attackers with sufficient delegated permissions (e.g., control over a service account that can write SPNs) temporarily register a malicious SPN to a target user account.
  • Stealthy Credential Extraction: Immediately after registering the SPN, they request a Kerberos service ticket for this newly created SPN. This ticket, as in traditional Kerberoasting, contains the NTLM hash of the target user’s password.
  • Eradication of Traces: Crucially, the attackers then delete the malicious SPN. This rapid creation and deletion process leaves minimal to no forensic evidence of the SPN ever existing in Active Directory’s persistent state.
  • Evasion of Detection: Traditional Kerberoasting detection models often rely on logging and monitoring for the persistent creation of new SPNs or the unusual repeated querying of legitimate SPNs. Because Ghost SPNs are fleeting, these detection methods can be effectively blinded, allowing the activity to fly “under the radar.”

This sophisticated technique highlights a critical gap in many organizations’ security postures, particularly those with complex Active Directory environments and broad delegation schemes.

Remediation Actions and Mitigation Strategies

Protecting against Ghost SPN and similar advanced Kerberoasting techniques requires a multi-layered approach focusing on Active Directory hygiene, robust monitoring, and stringent permission management.

  • Principle of Least Privilege: Rigorously review and enforce the principle of least privilege for all service accounts and delegated administrators. Identify and remove any unnecessary permissions that allow for SPN registration on user accounts. Minimize “write servicePrincipalName” permissions.
  • Advanced Active Directory Auditing: Enhance Active Directory auditing to capture granular events related to SPN creation, modification, and deletion. Pay close attention to events like Event ID 4741 (A computer account was created), Event ID 4742 (A computer account was changed), and especially those related to servicePrincipalName attribute modifications. While the deletion might be quick, capturing the creation event, even transiently, is crucial.
  • Baseline SPN Monitoring: Establish a baseline of legitimate SPNs within your environment. Implement regular automated checks to compare current SPN registrations against this baseline and alert on any deviations, no matter how brief.
  • Monitor for Unusual Service Ticket Requests: Look for unusual patterns in Kerberos service ticket (TGS_REQ) requests. While Ghost SPN cleans up its tracks, the request for the service ticket still occurs. Hunt for requests for newly created or rapidly deleted SPNs, or requests for SPNs associated with user accounts from unusual sources or at unusual times.
  • Strong Password Policies for Service Accounts: Enforce strong, complex, and regularly rotated passwords for all service accounts. This makes extracted NTLM hashes significantly harder to crack offline, even if the attack is successful. Consider using Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs) where applicable, as they manage passwords automatically and can reduce the attack surface.
  • Network Traffic Analysis: Implement deep packet inspection and network traffic analysis to detect Kerberos TGS-REQ packets that could indicate Kerberoasting activity, even for transient SPNs. Look for suspicious source IPs requesting tickets for service accounts.
  • Endpoint Detection and Response (EDR): Utilize EDR solutions to monitor for suspicious process activity on endpoints, especially those associated with Active Directory interaction.

Relevant Tools for Detection and Mitigation

While no single tool provides a silver bullet against Ghost SPN, a combination of the right technologies can significantly bolster your defenses.

Tool Name Purpose Link
BloodHound Identifies complex attack paths, including SPN delegation vulnerabilities. https://bloodhound.readthedocs.io/en/latest/
Mimikatz Post-exploitation tool capable of performing Kerberoasting (can be used for testing defense). https://github.com/gentilkiwi/mimikatz
ADSecurity.org Kerberoast Script Scripts to identify vulnerable service accounts for Kerberoasting. https://adsecurity.org/?p=3465
Microsoft Defender for Identity Behavioral analytics for AD, detects suspicious activities like Kerberoasting. https://learn.microsoft.com/en-us/defender-for-identity/
Splunk / ELK Stack SIEM platforms for aggregating and analyzing AD security logs (Event IDs, Kerberos logs). https://www.splunk.com/

Conclusion

The Ghost SPN attack serves as a stark reminder that the adversaries constantly refine their tactics. By transiently creating and deleting SPNs, attackers aim to bypass traditional Kerberoasting detection, making credential extraction an invisible act. For organizations, this necessitates moving beyond basic Active Directory security practices to adopt a proactive and in-depth defense. Implementing strict least privilege, enhanced auditing, continuous monitoring for SPN changes (however brief), and leveraging advanced security solutions are critical steps to detect and deter this sophisticated threat. Stay vigilant, secure your Active Directory, and prioritize detection of even the most fleeting indicators of compromise.

Share this article

Leave A Comment