T1552 Unsecured Credentials
Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History), operating system or application-specific repositories (e.g. Credentials in Registry), or other specialized files/artifacts (e.g. Private Keys).
| Item | Value |
|---|---|
| ID | T1552 |
| Sub-techniques | T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1552.007, T1552.008 |
| Tactics | TA0006 |
| Platforms | Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS |
| Version | 1.3 |
| Created | 04 February 2020 |
| Last Modified | 13 April 2023 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S0373 | Astaroth | Astaroth uses an external software known as NetPass to recover passwords. 5 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1015 | Active Directory Configuration | Remove vulnerable Group Policy Preferences.1 |
| M1047 | Audit | Preemptively search for files containing passwords or other credentials and take actions to reduce the exposure risk when found. |
| M1041 | Encrypt Sensitive Information | When possible, store keys on separate cryptographic hardware instead of on the local system. |
| M1037 | Filter Network Traffic | Limit access to the Instance Metadata API. A properly configured Web Application Firewall (WAF) may help prevent external adversaries from exploiting Server-side Request Forgery (SSRF) attacks that allow access to the Cloud Instance Metadata API.2 |
| M1035 | Limit Access to Resource Over Network | Limit network access to sensitive services, such as the Instance Metadata API. |
| M1028 | Operating System Configuration | There are multiple methods of preventing a user’s command history from being flushed to their .bash_history file, including use of the following commands: |
set +o history and set -o history to start logging again; |
||
unset HISTFILE being added to a user’s .bash_rc file; and |
||
ln -s /dev/null ~/.bash_history to write commands to /dev/nullinstead. |
||
| M1027 | Password Policies | Use strong passphrases for private keys to make cracking difficult. Do not store credentials within the Registry. Establish an organizational policy that prohibits password storage in files. |
| M1026 | Privileged Account Management | If it is necessary that software must store credentials in the Registry, then ensure the associated accounts have limited permissions so they cannot be abused if obtained by an adversary. |
| M1022 | Restrict File and Directory Permissions | Restrict file shares to specific directories with access only to necessary users. |
| M1051 | Update Software | Apply patch KB2962486 which prevents credentials from being stored in GPPs.34 |
| M1017 | User Training | Ensure that developers and system administrators are aware of the risk associated with having plaintext passwords in software configuration files that may be left on endpoint systems or servers. |
Detection
| ID | Data Source | Data Component |
|---|---|---|
| DS0015 | Application Log | Application Log Content |
| DS0017 | Command | Command Execution |
| DS0022 | File | File Access |
| DS0009 | Process | Process Creation |
| DS0002 | User Account | User Account Authentication |
| DS0024 | Windows Registry | Windows Registry Key Access |
References
-
Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved January 28, 2015. ↩
-
Higashi, Michael. (2018, May 15). Instance Metadata API: A Modern Day Trojan Horse. Retrieved July 16, 2019. ↩
-
Sean Metcalf. (2015, December 28). Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. Retrieved February 17, 2020. ↩
-
Microsoft. (2014, May 13). MS14-025: Vulnerability in Group Policy Preferences could allow elevation of privilege. Retrieved February 17, 2020. ↩
-
Salem, E. (2019, February 13). ASTAROTH MALWARE USES LEGITIMATE OS AND ANTIVIRUS PROCESSES TO STEAL PASSWORDS AND PERSONAL DATA. Retrieved April 17, 2019. ↩
-
Slack Help Center. (n.d.). View Access Logs for your workspace. Retrieved April 10, 2023. ↩