Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0002

Mimikatz

Type

Post-exploitation tool

Associated threat actors

Various

Key Capabilities

Steals credentials from memory by extracting plaintext passwords and hashes, performing pass-the-hash attacks, and manipulating Kerberos tickets.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Mimikatz?

Mimikatz (S0002) is an open-source tool that extracts authentication credentials from computer memory. It targets the Windows LSASS process to dump plaintext passwords and hashes.

Originally for security research, attackers now widely use it for credential theft. By enabling attacks like pass-the-hash, Mimikatz is a key post-exploitation tool for privilege escalation and lateral movement within a network, often preceding major ransomware attacks.

How to Defend Against Mimikatz?

A layered defense can effectively counter Mimikatz by protecting credentials and detecting its unique behaviors.

  • Keep systems patched to limit initial access vulnerabilities.
  • Enforce strong password policies and limit administrative privileges.
  • Use network segmentation to contain potential lateral movement.
  • Deploy endpoint detection to detect and block memory scraping attempts on LSASS.
  • Use network detection (NDR) and integrated threat intelligence to continuously monitor and block known Mimikatz activity.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.