Mimikatz explained: the credential theft tool defenders must understand

Key insights

  • Mimikatz remains a top threat in 2026. It ranked #4 in the Red Canary 2026 Threat Detection Report, affecting 3.1% of monitored customers, and is actively used by Play and Akira ransomware groups.
  • Signature-based detection alone is no longer sufficient. Eighty-two percent of CrowdStrike detections in 2026 were malware-free, meaning attackers routinely bypass file-based signatures through PowerShell variants, renamed binaries, and in-memory execution.
  • Layered defense is the only reliable strategy. Credential Guard, LSA Protection, WDigest hardening, and behavioral detection must work together — no single control stops all Mimikatz attack paths.
  • Mimikatz maps to 17 MITRE ATT&CK techniques across four tactics. This makes it a critical tool to address for NIST CSF and CIS Controls compliance programs.
  • Behavioral detection and ITDR are the future. Organizations that move beyond static rules to identity threat detection and response dramatically reduce mean time to detect credential theft.

Every credential in your environment is a potential skeleton key. Mimikatz — the open-source tool that has fueled credential theft for over a decade — remains one of the most dangerous post-exploitation tools in the wild. Over 50 advanced persistent threat groups use it, according to the MITRE ATT&CK Mimikatz entry (S0002). The 2025 Verizon DBIR found stolen credentials were the initial access vector in 22% of breaches. For defenders, understanding Mimikatz is not optional — it is essential.

What is Mimikatz?

Mimikatz is an open-source Windows credential extraction tool created by French security researcher Benjamin Delpy (gentilkiwi) in 2011 to demonstrate weaknesses in how Windows stores authentication credentials in memory. Originally a proof-of-concept, it quickly became one of the most widely adopted post-exploitation tools by both penetration testers and adversaries worldwide.

The name "Mimikatz" combines the French slang "mimi" (cute) with "katz" (cats) — a deceptively playful name for a tool that has enabled billions of dollars in damage. Mimikatz is not a virus or malware in the traditional sense. It is a dual-use security tool, classified by antivirus vendors as HackTool:Win32/Mimikatz because of how frequently threat actors abuse it. Possessing and using Mimikatz for authorized security testing is legal. Using it against systems without authorization violates computer fraud laws such as the CFAA in the United States and the Computer Misuse Act in the United Kingdom.

What makes Mimikatz significant is its scale of adoption. MITRE ATT&CK tracks over 50 threat groups that deploy Mimikatz as part of their operations. The Red Canary 2026 Threat Detection Report ranks it #4 among threats, affecting 3.1% of monitored customers even after excluding red team testing activity.

Why Mimikatz still matters in 2026

Despite being over 15 years old, Mimikatz is more relevant than ever. CISA advisories updated in June 2025 (Play ransomware) and November 2025 (Akira ransomware) confirm its active use in ongoing campaigns. The 2025 Verizon DBIR reports that 54% of ransomware victims had credentials previously exposed in infostealer logs — the exact type of credential material Mimikatz harvests. Benjamin Delpy continuously updates the tool to address new Windows security features, keeping it effective against modern operating systems including Windows 10 and Windows 11 when defenses are not properly configured.

How Mimikatz works

Mimikatz targets the Windows Local Security Authority Subsystem Service (LSASS) — the process responsible for enforcing security policies and handling user authentication. LSASS stores credential material in memory so users can access network resources without re-entering passwords. Mimikatz exploits this design by reading credential data directly from the LSASS process memory space.

To access LSASS memory, Mimikatz requires privilege escalation to administrator or SYSTEM-level access, specifically the SeDebugPrivilege token. Once elevated, the tool uses three primary modules:

  • sekurlsa — Extracts credential material directly from LSASS process memory, including NTLM hashes, Kerberos tickets, and WDigest plaintext passwords
  • lsadump — Reads credentials from the SAM database, LSA secrets, and Active Directory replication data (used in DCSync attacks)
  • kerberos — Manipulates Kerberos tickets for golden ticket and silver ticket attacks

A particularly dangerous variant is Invoke-Mimikatz, a PowerShell script from the PowerSploit framework that runs Mimikatz entirely in memory without writing to disk. Red Canary's 2026 report identifies Invoke-Mimikatz with the -dumpcreds parameter as the most common execution method observed. This fileless approach bypasses file-based signature detection entirely, which is why defenders who rely solely on antivirus are at a significant disadvantage.

Credential types Mimikatz can extract

Diagram: LSASS memory extraction flow — Mimikatz obtains SeDebugPrivilege, accesses the LSASS process, then extracts NTLM hashes, Kerberos tickets, WDigest cleartext passwords, and DPAPI keys.

Credential Type Storage Location Attack Enabled Detection Indicator
NTLM hashes LSASS memory Pass-the-hash (T1550.002) Sysmon Event ID 10 on lsass.exe
Kerberos TGT/TGS LSASS memory Pass-the-ticket (T1550.003), golden/silver ticket Anomalous ticket requests (Event ID 4769)
WDigest cleartext LSASS memory (if enabled) Direct credential reuse UseLogonCredential registry value = 1
SAM database Registry hive Local account compromise Registry access to SAM hive
LSA secrets Registry/memory Service account compromise Unauthorized LSA secret access
DPAPI keys LSASS memory Decryption of protected data DPAPI blob access patterns

Table: Credential types Mimikatz can extract from Windows memory.

Mimikatz attack techniques

Mimikatz enables six major attack techniques spanning credential theft attacks, ticket forgery, and domain replication. Each maps to specific MITRE ATT&CK technique IDs with distinct detection indicators.

Technique MITRE ID What It Does Detection Indicator
Pass-the-hash T1550.002 Uses stolen NTLM hashes to authenticate without knowing the plaintext password NTLM authentication from unexpected hosts (Event ID 4624, Logon Type 9)
Golden ticket T1558.001 Forges Kerberos TGTs using the KRBTGT hash for unlimited domain access TGT with abnormal lifetime or issued by non-DC (Event ID 4769)
Silver ticket T1558.002 Forges TGS tickets for specific services without contacting the domain controller Service ticket without preceding TGT request
DCSync T1003.006 Replicates AD credentials remotely via directory replication protocol Anomalous DS-Replication-Get-Changes requests from non-DC (Event ID 4662)
Overpass-the-hash T1550.002 Converts NTLM hashes into Kerberos tickets to bypass NTLM restrictions Kerberos AS-REQ with RC4 encryption from unexpected source
Pass-the-ticket T1550.003 Reuses stolen Kerberos tickets to impersonate users Ticket used from different IP than original authentication

Table: Mimikatz attack techniques mapped to MITRE ATT&CK with detection indicators.

Pass-the-hash and pass-the-ticket

A pass-the-hash attack uses extracted NTLM hashes to authenticate to remote services without cracking the password. The attacker simply presents the hash directly to the authentication protocol. Pass-the-ticket works similarly but uses stolen Kerberos tickets instead of NTLM hashes. Both techniques enable lateral movement across the network and are particularly dangerous because they leave minimal forensic evidence compared to brute-force attacks.

Golden ticket and silver ticket attacks

A golden ticket attack is among the most devastating Mimikatz capabilities. By extracting the KRBTGT account hash — the key that encrypts all Kerberos ticket-granting tickets in Active Directory — an attacker can forge TGTs granting unrestricted domain access for any user, including non-existent ones. Golden tickets persist until the KRBTGT password is reset twice. Silver ticket attacks are more targeted, forging service-specific tickets using a service account hash. While silver tickets have a smaller blast radius, they are harder to detect because they bypass the domain controller entirely.

DCSync attacks

DCSync is a particularly dangerous Mimikatz technique (T1003.006) that impersonates a domain controller to request credential data through the Active Directory replication protocol. Unlike LSASS memory extraction, DCSync operates remotely — the attacker does not need to touch the target domain controller. It requires DS-Replication-Get-Changes privileges, which domain admins and domain controller accounts hold by default. Detection relies on monitoring Event ID 4662 for replication requests originating from non-domain-controller sources. Organizations using Kerberoasting detections often see DCSync as a natural escalation in the attack chain.

Mimikatz in practice: real-world attacks

Mimikatz has been central to some of the most destructive cyberattacks in history. According to the 2025 Verizon DBIR, 54% of ransomware victims had credentials previously exposed in infostealer logs, underscoring the real-world impact of credential theft tools.

Each of these cases demonstrates a consistent pattern. Attackers gain initial access, escalate privileges, deploy Mimikatz or a variant to harvest credentials, and then move laterally across the environment. Disrupting any stage of this chain limits the blast radius.

Detecting and preventing Mimikatz

Effective Mimikatz defense requires layered controls combining LSASS access monitoring, behavioral threat detection, Credential Guard, and privilege reduction. No single solution stops all attack paths. Red Canary's 2026 report states that "the days of detecting LSASS-abusing tools like Mimikatz via traditional methods... are far behind us." Threat detection must evolve accordingly.

Detection engineering for Mimikatz

SOC teams should prioritize behavioral signals over static signatures. Here is a detection checklist organized by monitoring layer:

Detection Method What to Monitor Event Source Notes
LSASS access monitoring Processes accessing lsass.exe with GrantedAccess 0x1010 or 0x1410 Sysmon Event ID 10 High-fidelity signal; tune for legitimate security tools
PowerShell logging ScriptBlock containing "Invoke-Mimikatz" or "sekurlsa" PowerShell ScriptBlock Logging (Event ID 4104) Catches fileless execution variants
Kerberos anomalies TGTs with unusual lifetimes or RC4 encryption Windows Security Event ID 4769 Indicates golden ticket or overpass-the-hash
DCSync detection Replication requests from non-domain-controller IPs Windows Security Event ID 4662 Critical for DCSync attack visibility
Credential dumping LSASS minidump file creation Sysmon Event ID 11 (file creation) Play ransomware uses this technique
Privilege escalation SeDebugPrivilege token assignment Windows Security Event ID 4672 Prerequisite for standard Mimikatz execution
Lateral movement NTLM authentication from unexpected sources Windows Security Event ID 4624 (Type 9) Signals pass-the-hash activity
Behavioral analytics Anomalous SMB patterns, unusual process lineage NDR and UEBA platforms Catches variants that evade signature detection

Table: Mimikatz detection checklist for SOC teams.

Proactive threat hunting for these indicators — rather than waiting for automated alerts — dramatically improves mean time to detect. The Splunk LSASS hunting guide and Red Canary LSASS Memory technique analysis provide additional detection engineering depth.

Hardening Windows against credential theft

Prevention controls reduce the attack surface before Mimikatz can execute:

  1. Enable Credential Guard — Uses virtualization-based security (VBS) to isolate credential material from LSASS. Microsoft recommends enabling Credential Guard with HVCI on all supported systems. Note that known bypass techniques exist (including NativeBypassCredGuard), which is why layered defense remains necessary.
  2. Enable LSA Protection (PPL) — Protected Process Light restricts which processes can access LSASS memory, blocking standard Mimikatz extraction.
  3. Disable WDigest authentication — Set the registry key HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential to 0 to prevent cleartext password storage.
  4. Implement least-privilege access — Reduce the number of accounts with administrator or domain admin privileges.
  5. Manage KRBTGT passwords — After suspected golden ticket compromise, perform a double-reset of the KRBTGT account password as part of incident response.
  6. Deploy endpoint detection — While Windows Defender detects known Mimikatz binaries (HackTool:Win32/Mimikatz), attackers routinely bypass signature-based detection through binary modification, custom compilation, and PowerShell variants.

Mimikatz, MITRE ATT&CK, and compliance

Mimikatz maps to 17 techniques across four MITRE ATT&CK tactics, making it one of the most broadly applicable tools in the framework (S0002). Organizations using compliance frameworks can map these techniques directly to control requirements.

Tactic Technique ID Technique Name Detection Approach
Credential Access T1003.001 LSASS Memory Sysmon Event ID 10, LSASS access monitoring
Credential Access T1003.006 DCSync Event ID 4662, replication traffic analysis
Lateral Movement T1550.002 Pass-the-Hash Event ID 4624 Type 9, unexpected NTLM auth
Credential Access T1558.001 Golden Ticket Event ID 4769, abnormal TGT lifetime

Table: MITRE ATT&CK to NIST Cybersecurity Framework crosswalk for Mimikatz techniques.

These mappings align with NIST CSF controls PR.AC-1 (credential management), DE.CM-1 (network monitoring), and RS.AN-1 (investigation). CIS Controls v8 addresses Mimikatz risks through Controls 5 (Account Management), 6 (Access Control), 8 (Audit Logs), and 16 (Application Software Security).

Modern approaches to credential theft defense

The industry is shifting beyond signature-based Mimikatz detection toward behavioral and identity-centric approaches. CrowdStrike's 2026 Global Threat Report confirms that 82% of detections were malware-free, and AI-enabled adversary operations rose 89% year-over-year. Static rules simply cannot keep pace.

Network detection and response (NDR) provides visibility into lateral movement patterns that credential theft enables. Identity threat detection and response (ITDR) monitors authentication behavior across Active Directory and cloud identity providers to catch pass-the-hash, golden ticket, and DCSync attacks through behavioral anomalies rather than signatures.

How Vectra AI approaches credential theft detection

Vectra AI's Attack Signal Intelligence correlates identity-based attack signals across the modern network, detecting credential theft behaviors like pass-the-hash and golden ticket attacks through behavioral analysis rather than signatures. The platform provides coverage across on-premises Active Directory and cloud identity providers, enabling SOC teams to detect and respond to Mimikatz-style attacks in real time — reducing mean time to detect from hours to minutes.

Future trends and emerging considerations

The credential theft landscape is evolving rapidly, with several developments set to reshape how organizations defend against Mimikatz and related tools over the next 12-24 months.

AI-powered credential attacks are accelerating. IBM X-Force's 2026 report found that over 300,000 ChatGPT credentials were stolen by infostealers, signaling that AI service accounts are becoming high-value targets alongside traditional Active Directory credentials. As organizations deploy more AI agents with privileged access, the attack surface for credential theft tools expands significantly.

Living-off-the-land credential dumping is growing. Attackers increasingly use built-in Windows tools like comsvcs.dll MiniDump and ProcDump (a legitimate Microsoft Sysinternals tool) to dump LSASS memory, avoiding the need to deploy Mimikatz at all. Defenders must monitor for the behavior — LSASS access patterns — not just the tool.

Third-party and supply chain credential exposure is doubling. The 2025 Verizon DBIR reports that breaches involving external partners doubled year-over-year to 30%. Credential theft tools deployed in partner environments can compromise interconnected organizations. This makes zero-trust architecture and continuous identity verification essential, not optional.

Regulatory pressure is increasing. Frameworks like NIST CSF 2.0 and evolving SEC disclosure requirements are pushing organizations to demonstrate specific credential protection controls and detection capabilities. Documenting MITRE ATT&CK coverage for tools like Mimikatz is becoming a compliance expectation, not just a best practice.

Organizations should prioritize investing in behavioral detection capabilities, ITDR platforms, and privileged access management to stay ahead of these trends.

Conclusion

Mimikatz has persisted as a dominant credential theft tool for over 15 years because it exploits fundamental design characteristics of Windows authentication. The credentials stored in LSASS memory — NTLM hashes, Kerberos tickets, and sometimes cleartext passwords — represent the keys to lateral movement, privilege escalation, and domain dominance.

Defending against Mimikatz requires a shift from signature-based detection to behavioral analysis. Monitor LSASS access patterns, enable Credential Guard and LSA Protection, disable WDigest, reduce privileged accounts, and invest in identity threat detection that catches the behavior — not just the binary. The organizations that fare best are those that assume compromise and focus on finding attackers who are already inside.

To explore how Attack Signal Intelligence detects credential theft behaviors across your hybrid environment, visit the Vectra AI platform or request a demo.

Related cybersecurity fundamentals

FAQs

Is Mimikatz a virus?

Is Mimikatz illegal?

What is the difference between Mimikatz and Meterpreter?

Does Mimikatz work on Windows 10 and Windows 11?

What are alternatives to Mimikatz?

What is Invoke-Mimikatz?

Can Windows Defender detect Mimikatz?