T1098 Account Manipulation Mappings

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials.

In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain. However, account manipulation may also lead to privilege escalation where modifications grant access to additional roles, permissions, or higher-privileged Valid Accounts.

View in MITRE ATT&CK®

NIST 800-53 Mappings

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1098.003 Additional Cloud Roles 12
T1098.004 SSH Authorized Keys 16
T1098.005 Device Registration 7
T1098.001 Additional Cloud Credentials 16
T1098.002 Additional Email Delegate Permissions 12