T1556.004
Network Device Authentication
Adversaries may patch network device operating systems to add a hardcoded backdoor password, bypassing normal authentication for local accounts on routers, switches, and VPN appliances. SYNful Knock implanted a backdoor password in Cisco IOS router images, checking if login credentials match the backdoor password before passing them to normal authentication. SLOWPULSE modified Pulse Secure LDAP and 2FA authentication to accept a designated attacker-supplied password. Detection relies on network configuration integrity checks and unusual authentication behavior.
Microsoft Sentinel / Defender
kusto
// Network device authentication anomalies via syslog forwarded to Sentinel
Syslog
| where TimeGenerated > ago(24h)
| where Facility == "security" or SeverityLevel in ("warning", "error", "alert", "emergency")
| where SyslogMessage has_any (
"Authentication succeeded", "login successful", "accepted",
"incorrect password", "authentication failed"
)
| where HostName has_any ("router", "switch", "fw", "vpn", "asa", "ios", "junos", "nexus", "palo")
or SourceSystem == "Syslog"
| extend AuthResult = case(
SyslogMessage has_any ("succeeded", "successful", "accepted"), "SUCCESS",
SyslogMessage has_any ("failed", "incorrect", "denied"), "FAILURE",
"UNKNOWN"
)
| summarize TotalEvents=count(), Successes=countif(AuthResult=="SUCCESS"),
Failures=countif(AuthResult=="FAILURE"), UniqueUsers=dcount(ProcessName)
by HostName, Computer, bin(TimeGenerated, 1h)
| where Failures > 10 or (Successes > 5 and Failures == 0)
| sort by TimeGenerated desc high severity
medium confidence
Data Sources
Network Traffic: Network Traffic Content Authentication: Authentication Logs Syslog from network devices
Required Tables
Syslog CommonSecurityLog
False Positives
- Legitimate network administrators performing password rotation across multiple devices simultaneously
- Network monitoring tools (SolarWinds, PRTG, LibreNMS) using SNMP or SSH that generate authentication events during polling
- Automated configuration management tools (Ansible, Netmiko) running playbooks against multiple devices
- Network device failover events causing brief authentication spike as backup devices come online
Last updated: 2026-04-13 Research depth: deep
References (5)
- https://attack.mitre.org/techniques/T1556/004/
- https://cloud.google.com/blog/topics/threat-intelligence/synful-knock-acis/
- https://tools.cisco.com/security/center/resources/integrity_assurance.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1556.004/T1556.004.md
- https://www.mandiant.com/resources/blog/mandiant-identifies-new-pulse-connect-secure-vulnerabilities
Unlock Pro Content
Get the full detection package for T1556.004 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance