T1555 Credentials from Password Stores Mappings

Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.malware.variety.Password dumper Password dumper (extract credential hashes) related-to T1555 Credentials from Password Stores
attribute.confidentiality.data_disclosure None related-to T1555 Credentials from Password Stores
aws_secrets_manager AWS Secrets Manager technique_scores T1555 Credentials from Password Stores
Comments
This control may prevent harvesting of credentials from password stores by providing a secure, finely controlled location for secrets storage. This control is only relevant for credentials that would be used from application and configuration files and not those entered directly by an end user.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1555.002 Securityd Memory 3
T1555.001 Keychain 2
T1555.005 Password Managers 2
T1555.003 Credentials from Web Browsers 2
T1555.006 Cloud Secrets Management Stores 3
T1555.004 Windows Credential Manager 2