Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-2 | Account Management | Protects | T1136 | Create Account |
AC-20 | Use of External Systems | Protects | T1136 | Create Account |
AC-3 | Access Enforcement | Protects | T1136 | Create Account |
AC-4 | Information Flow Enforcement | Protects | T1136 | Create Account |
AC-5 | Separation of Duties | Protects | T1136 | Create Account |
AC-6 | Least Privilege | Protects | T1136 | Create Account |
CM-5 | Access Restrictions for Change | Protects | T1136 | Create Account |
CM-6 | Configuration Settings | Protects | T1136 | Create Account |
CM-7 | Least Functionality | Protects | T1136 | Create Account |
IA-2 | Identification and Authentication (organizational Users) | Protects | T1136 | Create Account |
IA-5 | Authenticator Management | Protects | T1136 | Create Account |
SC-46 | Cross Domain Policy Enforcement | Protects | T1136 | Create Account |
SC-7 | Boundary Protection | Protects | T1136 | Create Account |
SI-4 | System Monitoring | Protects | T1136 | Create Account |
SI-7 | Software, Firmware, and Information Integrity | Protects | T1136 | Create Account |
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1136.003 | Cloud Account | 15 |
T1136.002 | Domain Account | 15 |
T1136.001 | Local Account | 11 |