T1110.004 Credential Stuffing Mappings

Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The information may be useful to an adversary attempting to compromise accounts by taking advantage of the tendency for users to use the same passwords across personal and business accounts.

Credential stuffing is a risky option because it could cause numerous authentication failures and account lockouts, depending on the organization's login failure policies.

Typically, management services over commonly used ports are used when stuffing credentials. Commonly targeted services include the following:

  • SSH (22/TCP)
  • Telnet (23/TCP)
  • FTP (21/TCP)
  • NetBIOS / SMB / Samba (139/TCP & 445/TCP)
  • LDAP (389/TCP)
  • Kerberos (88/TCP)
  • RDP / Terminal Services (3389/TCP)
  • HTTP/HTTP Management Services (80/TCP & 443/TCP)
  • MSSQL (1433/TCP)
  • Oracle (1521/TCP)
  • MySQL (3306/TCP)
  • VNC (5900/TCP)

In addition to management services, adversaries may "target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols," as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-02 Account Management Protects T1110.004 Credential Stuffing
AC-20 Use of External Systems Protects T1110.004 Credential Stuffing
AC-03 Access Enforcement Protects T1110.004 Credential Stuffing
AC-05 Separation of Duties Protects T1110.004 Credential Stuffing
AC-06 Least Privilege Protects T1110.004 Credential Stuffing
AC-07 Unsuccessful Logon Attempts Protects T1110.004 Credential Stuffing
CA-07 Continuous Monitoring Protects T1110.004 Credential Stuffing
CM-02 Baseline Configuration Protects T1110.004 Credential Stuffing
CM-06 Configuration Settings Protects T1110.004 Credential Stuffing
IA-11 Re-authentication Protects T1110.004 Credential Stuffing
IA-02 Identification and Authentication (organizational Users) Protects T1110.004 Credential Stuffing
IA-04 Identifier Management Protects T1110.004 Credential Stuffing
IA-05 Authenticator Management Protects T1110.004 Credential Stuffing
SI-04 System Monitoring Protects T1110.004 Credential Stuffing
ME-PWA-E3 Passwordless Authentication Technique Scores T1110.004 Credential Stuffing
ME-PWP-E3 Password Policy Technique Scores T1110.004 Credential Stuffing
ME-PP-E3 Password Protection Technique Scores T1110.004 Credential Stuffing
ME-MFA-E3 Multi-factor Authentication Technique Scores T1110.004 Credential Stuffing
ME-IP-E5 Identity Protection Technique Scores T1110.004 Credential Stuffing
ME-CA-E5 Conditional Access Technique Scores T1110.004 Credential Stuffing
DEF-SecScore-E3 Secure Score Technique Scores T1110.004 Credential Stuffing
DEF-LM-E5 Lateral Movements Technique Scores T1110.004 Credential Stuffing
DEF-IR-E5 Incident Response Technique Scores T1110.004 Credential Stuffing
DO365-AG-E5 App Governance Technique Scores T1110.004 Credential Stuffing
DO365-ATH-E5 Advanced Threat Hunting Technique Scores T1110.004 Credential Stuffing