Categories: Cyber Security News

Windows Hit by Authentication Coercion That Tricks Machines into Sending Credentials

Security researchers have identified a growing wave of authentication coercion attacks that exploit Windows Remote Procedure Call (RPC) mechanisms to force systems to send their credentials to attacker‑controlled machines.

Unlike traditional phishing or privilege‑escalation tactics, these attacks manipulate Windows’ built‑in network authentication behavior, requiring no user interaction or administrative privileges.

Authentication coercion misuses a legitimate Windows feature that allows systems to execute procedures on remote machines.

By abusing this mechanism, threat actors can make high‑value assets such as Domain Controllers, Certificate Authorities, and Citrix servers authenticate to malicious servers.

Once authentication occurs, attackers capture NTLM hashes and use relay attacks to move laterally or escalate privileges across the environment.

Rare RPC Interfaces Used to Evade Defenses

The trend, first observed by Unit 42 researchers, builds on earlier coercion exploits such as PrintNightmare (CVE‑2021‑34527) and PetitPotam (CVE‑2021‑36942). However, current campaigns increasingly target obscure RPC functions that evade existing detections.

Tools like DFSCoerceShadowCoerce, and CheeseOunce exploit lesser‑known Windows RPC protocols, such as MS‑DFSNM, MS‑FSRVP, and MS‑EVEN, which are rarely used in normal enterprise operations.

A summary of the attack stages seen on a customer network.

In one March 2025 attack against a healthcare organization, investigators found that adversaries used the remote event‑logging interface (MS‑EVEN) and the ElfrOpenBELW function to coerce authentication.

The activity originated from a compromised internal machine that attempted to make multiple critical assets, including RADIUS and Domain Controller servers, authenticate to an external attacker’s IP address.

Though initial credential-relay attempts failed, the attacker eventually succeeded in extracting machine account hashes from a Citrix and a Read‑Only Domain Controller, using them later in NTLM relay and DCSync operations.

Unit 42 noted that automation and proof‑of‑concept tools available publicly have significantly lowered the technical bar for conducting these operations.

As defenses hardened known vectors, threat actors pivoted to unmonitored RPC function calls, expanding the attack surface well beyond previously documented coercion paths.

Defensive Strategies and Monitoring

To defend against authentication coercion, researchers recommend strict monitoring of RPC traffic and baseline anomaly detection.

Key indicators include unusual UNC path parameters, RPC calls involving rare interface GUIDs or operation numbers (opnums), and outbound authentications to unrecognized IP addresses.

Prevention techniques include enforcing SMB signing, enabling Extended Protection for Authentication (EPA), disabling unused RPC‑based services such as the Print Spooler and File Server VSS Agent Service, and applying Windows RPC filters via netsh rpc rules.

Behavioral analytics in platforms like Cortex XDR and XSIAM can further detect coerced authentication attempts by correlating deviations from normal machine behavior.

Authentication coercion represents a subtle yet potent evolution in Windows credential theft tactics, one that demands deeper visibility into RPC behavior before attackers turn legitimate features into covert credential-extraction channels.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Windows Hit by Authentication Coercion That Tricks Machines into Sending Credentials appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Slay the Spire 2 Roadmap Has No Release Dates So Dev Can Avoid ‘Sloppy Spire 2’

Slay the Spire 2 developer Mega Crit has published a detailed roadmap for Slay the…

1 hour ago

The Best Deals Today: Sony 4K OLED BRAVIA 8 TV, 4K Blu-ray Bundles, AirPods Pro 3, and More

A new weekend has arrived, and today, you can save big on the 4K Movies,…

2 hours ago

Resident Evil Requiem Mercenaries Rumors Heat Up After Alleged Leak

Resident Evil Requiem fans believe next month’s mysterious content update will add a new version…

3 hours ago

Wrestlemania 42: All of the Match Winners, Returns, and Surprises — Updating Live!

Wrestlemania 42 is finally here, and I’m here in Las Vegas at Allegiant Stadium to…

3 hours ago

Charles Dance in Talks to Join The Batman Part 2 as Harvey Dent’s Father

Game of Thrones alum Charles Dance has reportedly entered talks to join The Batman Part…

4 hours ago

3D-printed steaks and lab-grown burgers sound like science fiction until you realize they’re already on the menu

Tension: We crave sustainable food innovation yet recoil from eating anything that didn’t come from…

5 hours ago

This website uses cookies.