Skip to content

DET0724 Detection of Valid Accounts

Item Value
ID DET0724
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T0859 (Valid Accounts)

Analytics

ICS

AN1857

Monitor for an authentication attempt by a user that may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Monitor for logon behavior that may abuse credentials of existing accounts as a means of gaining Lateral Movement or Persistence. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). Monitor for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account.

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) User Account None
Logon Session Creation (DC0067) Logon Session None
Logon Session Metadata (DC0088) Logon Session None
Mutable Elements
Field Description