Service Account Abuse Detection

AuthenticationAttacks Windows Security Service Account Compromise

What This Means

Detect unauthorized use of service accounts in your environment. Identify stolen service credentials, Kerberoasting targets, and service account misuse for lateral movement.

Example Log

An account was successfully logged on.
Account Name: svc_backup
Logon Type: 3
Source Network Address: 10.0.9.55
Authentication Package: NTLM

-- Note: svc_backup should only authenticate from BACKUP01 (10.0.1.10)

Indicators of Suspicious Activity

How to Investigate

  1. Document the intended scope of each service account (what host, what service, what time)
  2. Compare current authentication patterns against the documented scope
  3. Check if the service accounts password was recently changed
  4. Review Kerberos ticket requests (Event 4769) for the service account SPN
  5. Determine if any lateral movement occurred from the authenticating workstation
  6. Verify the service account has not been added to privileged groups

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Log Types

Related Attack Patterns

Frequently Asked Questions

Why are service accounts attractive targets for attackers?
Service accounts often have elevated privileges, rarely have MFA, frequently use static passwords that are never rotated, and their activity is less monitored than interactive user accounts.
What is Kerberoasting and how does it target service accounts?
Kerberoasting exploits the fact that any authenticated domain user can request a Kerberos service ticket for any account with an SPN. The ticket is encrypted with the service accounts password hash, which can be cracked offline.
How do I audit all service accounts in Active Directory?
Search for accounts with ServicePrincipalName set, accounts with 'Password Never Expires' flag, accounts in service-related OUs, and accounts with 'svc_' or similar naming conventions.