Description
Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.
Threat-Mapped Scoring
Threat Score:
3.0
Industry:
Threat Priority:
P2 - Serious (High)
ATT&CK Kill Chain Metadata
- Tactics: credential-access
- Platforms: Linux, macOS, Windows, IaaS
-
Detection Guidance:
Monitor system calls, file read events, and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches (e.g. password, pwd, login, store, secure, credentials, etc.) in process memory for credentials. File read events should be monitored surrounding known password storage applications.