Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.variety.Backdoor | Hacking action that creates a backdoor for use. | related-to | T1136 | Create Accounts | |
action.hacking.vector.Backdoor | Hacking actions taken through a backdoor. C2 is only used by malware. | related-to | T1136 | Create Accounts | |
action.malware.variety.Modify data | Malware which compromises a legitimate file rather than creating new filess | related-to | T1136 | Create Accounts | |
attribute.integrity.variety.Created account | Created new user account | related-to | T1136 | Create Accounts | |
aws_config | AWS Config | technique_scores | T1136 | Create Account |
Comments
This control provides partial coverage for one of this technique's sub-techniques, resulting in an overall score of Minimal.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1136.001 | Local Account | 1 |
T1136.002 | Domain Account | 1 |
T1136.003 | Cloud Account | 2 |