T1552 Unsecured Credentials
Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History), operating system or application-specific repositories (e.g. Credentials in Registry), or other specialized files/artifacts (e.g. Private Keys).
Item | Value |
---|---|
ID | T1552 |
Sub-techniques | T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1552.007, T1552.008 |
Tactics | TA0006 |
Platforms | Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS |
Version | 1.3 |
Created | 04 February 2020 |
Last Modified | 13 April 2023 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0373 | Astaroth | Astaroth uses an external software known as NetPass to recover passwords. 5 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1015 | Active Directory Configuration | Remove vulnerable Group Policy Preferences.1 |
M1047 | Audit | Preemptively search for files containing passwords or other credentials and take actions to reduce the exposure risk when found. |
M1041 | Encrypt Sensitive Information | When possible, store keys on separate cryptographic hardware instead of on the local system. |
M1037 | Filter Network Traffic | Limit access to the Instance Metadata API. A properly configured Web Application Firewall (WAF) may help prevent external adversaries from exploiting Server-side Request Forgery (SSRF) attacks that allow access to the Cloud Instance Metadata API.2 |
M1035 | Limit Access to Resource Over Network | Limit network access to sensitive services, such as the Instance Metadata API. |
M1028 | Operating System Configuration | There are multiple methods of preventing a user’s command history from being flushed to their .bash_history file, including use of the following commands: |
set +o history and set -o history to start logging again; |
||
unset HISTFILE being added to a user’s .bash_rc file; and |
||
ln -s /dev/null ~/.bash_history to write commands to /dev/null instead. |
||
M1027 | Password Policies | Use strong passphrases for private keys to make cracking difficult. Do not store credentials within the Registry. Establish an organizational policy that prohibits password storage in files. |
M1026 | Privileged Account Management | If it is necessary that software must store credentials in the Registry, then ensure the associated accounts have limited permissions so they cannot be abused if obtained by an adversary. |
M1022 | Restrict File and Directory Permissions | Restrict file shares to specific directories with access only to necessary users. |
M1051 | Update Software | Apply patch KB2962486 which prevents credentials from being stored in GPPs.34 |
M1017 | User Training | Ensure that developers and system administrators are aware of the risk associated with having plaintext passwords in software configuration files that may be left on endpoint systems or servers. |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0015 | Application Log | Application Log Content |
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0009 | Process | Process Creation |
DS0002 | User Account | User Account Authentication |
DS0024 | Windows Registry | Windows Registry Key Access |
References
-
Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved January 28, 2015. ↩
-
Higashi, Michael. (2018, May 15). Instance Metadata API: A Modern Day Trojan Horse. Retrieved July 16, 2019. ↩
-
Sean Metcalf. (2015, December 28). Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. Retrieved February 17, 2020. ↩
-
Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved February 17, 2020. ↩
-
Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019. ↩
-
Slack Help Center. (n.d.). View Access Logs for your workspace. Retrieved April 10, 2023. ↩