T1212 Exploitation for Credential Access

Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. 

Credentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is MS14-068, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)

Such exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)

Exploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.AE-02.01 Event analysis and detection Mitigates T1212 Exploitation for Credential Access
Comments
This diagnostic statement provides for implementation of methods to block similar future attacks via security tools such as antivirus and IDS/IPS to provide protection against threats and exploitation attempts.
References
    PR.PS-06.01 Secure SDLC process Mitigates T1212 Exploitation for Credential Access
    Comments
    This diagnostic statement protects against Exploitation for Credential Access through the implementation of measures in the application to validate authentication requests by enabling one-time passwords, providing timestamps or sequence numbers for messages sent, using digital signatures, and/or using random session keys.
    References
      PR.PS-06.05 Testing and validation strategy Mitigates T1212 Exploitation for Credential Access
      Comments
      This particular diagnostic statement highlights the use of software security testing, code integrity verifications, and vulnerability scanning to mitigate security weaknesses and vulnerabilities in developed code or applications that an adversary may be able to take advantage of.
      References
        ID.RA-01.03 Vulnerability management Mitigates T1212 Exploitation for Credential Access
        Comments
        This diagnostic statement provides protection from vulnerabilities in exposed applications from across the organization through the use of tools that scan for and review vulnerabilities along with patch management and remediation of those vulnerabilities.
        References
          PR.PS-02.01 Patch identification and application Mitigates T1212 Exploitation for Credential Access
          Comments
          This diagnostic statement is related to the implementation of a patch management program. Applying patches and upgrades for products and systems provided by vendors mitigates the risk of adversaries exploiting known vulnerabilities. For example, updating software regularly by employing patch management for internal enterprise endpoints and servers can help prevent adversary exploitation of software vulnerabilities to collect credentials.
          References
            PR.PS-06.06 Vulnerability remediation Mitigates T1212 Exploitation for Credential Access
            Comments
            This diagnostic statement provides for identifying and remediating vulnerabilities as part of the SDLC. Ensuring software is up-to-date with the latest security patches helps prevent adversaries from exploiting known vulnerabilities, reducing the risk of successful attacks.
            References
              PR.PS-05.02 Mobile code prevention Mitigates T1212 Exploitation for Credential Access
              Comments
              Mobile code procedures address specific actions taken to prevent the development, acquisition, and introduction of unacceptable mobile code within organizational systems, including requiring mobile code to be digitally signed by a trusted source.
              References
                PR.PS-01.09 Virtualized end point protection Mitigates T1212 Exploitation for Credential Access
                Comments
                The diagnostic statement highlights several mechanisms that organizations can implement to protect endpoint systems using virtualization technologies. Virtualization technologies provide a layer of isolation and containment to isolate and contain the impact of potential compromises. When it comes to this exploitation technique, consider making it difficult for adversaries to advance their operation through exploitation of unpatched vulnerabilities of your virtualized technologies.
                References
                  PR.PS-01.09 Virtualized end point protection Mitigates T1212 Exploitation for Credential Access
                  Comments
                  The diagnostic statement highlights several mechanisms that organizations can implement to protect endpoint systems using virtualization technologies. Virtualization technologies provide a layer of isolation and containment to isolate and contain the impact of potential compromises. When it comes to this exploitation technique, consider making it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities by using sandboxing. Other types of virtualization and application microsegmentation may also mitigate the impact of some types of exploitation.
                  References
                    PR.PS-06.07 Development and operational process alignment Mitigates T1212 Exploitation for Credential Access
                    Comments
                    This diagnostic statement protects against Exploitation for Credential Access through the use of DevSecOps, secure development lifecycle, and application developer guidance. Exploitable weaknesses can be mitigated through secure code, reduced vulnerabilities, and secure design principles.
                    References

                      NIST 800-53 Mappings

                      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                      CA-07 Continuous Monitoring mitigates T1212 Exploitation for Credential Access
                      CM-06 Configuration Settings mitigates T1212 Exploitation for Credential Access
                      IA-05 Authenticator Management mitigates T1212 Exploitation for Credential Access
                      RA-10 Threat Hunting mitigates T1212 Exploitation for Credential Access
                      SC-26 Decoys mitigates T1212 Exploitation for Credential Access
                      SC-30 Concealment and Misdirection mitigates T1212 Exploitation for Credential Access
                      SC-35 External Malicious Code Identification mitigates T1212 Exploitation for Credential Access
                      SI-05 Security Alerts, Advisories, and Directives mitigates T1212 Exploitation for Credential Access
                      SC-18 Mobile Code mitigates T1212 Exploitation for Credential Access
                      SC-02 Separation of System and User Functionality mitigates T1212 Exploitation for Credential Access
                      SC-03 Security Function Isolation mitigates T1212 Exploitation for Credential Access
                      SC-39 Process Isolation mitigates T1212 Exploitation for Credential Access
                      SI-02 Flaw Remediation mitigates T1212 Exploitation for Credential Access
                      RA-05 Vulnerability Monitoring and Scanning mitigates T1212 Exploitation for Credential Access
                      CM-08 System Component Inventory mitigates T1212 Exploitation for Credential Access
                      SI-03 Malicious Code Protection mitigates T1212 Exploitation for Credential Access
                      SI-07 Software, Firmware, and Information Integrity mitigates T1212 Exploitation for Credential Access
                      CM-02 Baseline Configuration mitigates T1212 Exploitation for Credential Access
                      CM-02 Baseline Configuration mitigates T1212 Exploitation for Credential Access
                      IA-02 Identification and Authentication (Organizational Users) mitigates T1212 Exploitation for Credential Access
                      SI-04 System Monitoring mitigates T1212 Exploitation for Credential Access
                      AC-02 Account Management mitigates T1212 Exploitation for Credential Access
                      AC-04 Information Flow Enforcement mitigates T1212 Exploitation for Credential Access
                      AC-06 Least Privilege mitigates T1212 Exploitation for Credential Access
                      SC-07 Boundary Protection mitigates T1212 Exploitation for Credential Access

                      VERIS Mappings

                      Azure Mappings

                      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                      alerts_for_windows_machines Alerts for Windows Machines technique_scores T1212 Exploitation for Credential Access
                      Comments
                      This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
                      References
                      azure_policy Azure Policy technique_scores T1212 Exploitation for Credential Access
                      Comments
                      This control may provide recommendations for vulnerability assessment and outdated applications and cloud services. This control covers a wide range of Azure cloud services to help reduce the surface area for exploitation.
                      References
                      azure_update_manager Azure Update Manager technique_scores T1212 Exploitation for Credential Access
                      Comments
                      This control provides significant coverage of credential access techniques that leverage unpatched software vulnerabilities since it enables automated updates of software and rapid configuration change management.
                      References
                      defender_for_app_service Microsoft Defender for Cloud: Defender for App Service technique_scores T1212 Exploitation for Credential Access
                      Comments
                      This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate.
                      References
                      vulnerability_management Microsoft Defender for Cloud: Vulnerability Management technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Once this control is deployed, it can detect known vulnerabilities in Windows and various Linux endpoints. This information can be used to patch, isolate, or remove vulnerable software and machines. This control does not directly protect against exploitation and it is not effective against zero day attacks, vulnerabilities with no available patch, and software that may not be analyzed by the scanner. As a result, the score is capped at Partial.
                      References

                      GCP Mappings

                      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                      artifact_analysis Artifact Analysis technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Artifact Analysis performs vulnerability scans on artifacts in Artifact Registry or Container Registry (deprecated). When Artifact Analysis is deployed, it can detect known vulnerabilities in various OS packages that could be used to escalate privileges and execute adversary-controlled code (e.g., Debian, Ubuntu, Alpine, RHEL, CentOS, National Vulnerability Database). Due to the medium threat detection coverage and temporal factor, the control was scored as partial.
                      References
                      confidential_vm Confidential VM technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Confidential VM main memory encryption is performed using dedicated hardware within the memory controllers. Confidential VM generates encryption keys in dedicated hardware which is inaccessible to the hypervisor, protecting against Exploitation for Credential Access from outside the VM.
                      References
                      google_secops Google Security Operations technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Google Security Ops triggers alerts based on credential exploit attempts (e.g., read /dev/cmdb/sslvpn_websession file, this file contains login and passwords in (clear-text)). This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/783e0e5947774785db1c55041b70176deeca6f46/soc_prime_rules/proactive_exploit_detection/webserver/cve_2018_13379_fortigate_ssl_vpn_arbitrary_file_reading.yaral
                      References
                      policy_intelligence Policy Intelligence technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Policy Intelligence role recommendations generated by IAM Recommender help admins remove unwanted access to GCP resources by using machine learning to make smart access control recommendations. With Recommender, security teams can automatically detect overly permissive access and rightsize them based on similar users in the organization and their access patterns. This control may mitigate adversaries that try to perform privilege escalation via permission levels and software exploitation.
                      References
                      vm_manager VM Manager technique_scores T1212 Exploitation for Credential Access
                      Comments
                      VM Manager can apply on-demand and scheduled patches via automated patch deployment. This can remediate OS and software vulnerabilities that could otherwise be exploited. Since VM Manager doesn't directly prevent exploitation of active vulnerabilities (including zero day vulnerabilities) this control has resulted in a score of Partial.
                      References

                      AWS Mappings

                      Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                      amazon_inspector Amazon Inspector technique_scores T1212 Exploitation for Credential Access
                      Comments
                      Amazon Inspector can detect known vulnerabilities on various Windows and Linux endpoints. Furthermore, the Amazon Inspector Best Practices assessment package can assess security controls for "Enable Address Space Layout Randomization (ASLR)" and "Enable Data Execution Prevention (DEP)" that makes it more difficult for an attacker to exploit vulnerabilities in software. This information can be used to patch, isolate, and remove vulnerable software and endpoints. Amazon Inspector does not directly protect against exploitation and it is not effective against zero-day attacks, vulnerabilities with no available patch, and software that may not be analyzed by the scanner. As a result, the score is capped at Partial.
                      References
                      aws_config AWS Config technique_scores T1212 Exploitation for Credential Access
                      Comments
                      The "ec2-managedinstance-applications-blacklisted" managed rule verifies that a pre-defined list of applications are not installed on specified managed instances. It can be used to identify the presence of vulnerable applications (prompting removal before they can be exploited) and/or to identify the presence of allowed packages below a minimum version (prompting updates before they can be exploited). The "ec2-managedinstance-platform-check" managed rule verifies that managed instances are running desired platform types, including using a desired version (as opposed to an out-of-date one).Both can reduce instances' attack surface for adversary exploitation, including for credential access. All of these are run on configuration changes. Coverage factor is partial for these rules, since they are specific to a subset of the available AWS services and will only protect against certain forms of identifiable exploitation, resulting in an overall score of Partial.
                      References
                      aws_secrets_manager AWS Secrets Manager technique_scores T1212 Exploitation for Credential Access
                      Comments
                      This control may protect against exploitation for credential access by removing credentials and secrets from applications that can be exploited and requiring authenticated API calls to retrieve those credentials and secrets.
                      References
                      aws_security_hub AWS Security Hub technique_scores T1212 Exploitation for Credential Access
                      Comments
                      AWS Security Hub reports on EC2 instances that are missing security patches for vulnerabilities which could enable an adversary to exploit vulnerabilities through the attack lifecycle. AWS Security Hub provides this detection with the following managed insight. EC2 instances that have missing security patches for important vulnerabilities This is scored as Partial because the checks associated with Security Hub would only report on missing patches for known vulnerabilities. It doesn't not cover zero-day vulnerabilities.
                      References