Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-2 | Account Management | Protects | T1098 | Account Manipulation | |
AC-3 | Access Enforcement | Protects | T1098 | Account Manipulation | |
AC-4 | Information Flow Enforcement | Protects | T1098 | Account Manipulation | |
AC-5 | Separation of Duties | Protects | T1098 | Account Manipulation | |
AC-6 | Least Privilege | Protects | T1098 | Account Manipulation | |
CM-5 | Access Restrictions for Change | Protects | T1098 | Account Manipulation | |
CM-6 | Configuration Settings | Protects | T1098 | Account Manipulation | |
CM-7 | Least Functionality | Protects | T1098 | Account Manipulation | |
IA-2 | Identification and Authentication (organizational Users) | Protects | T1098 | Account Manipulation | |
SC-46 | Cross Domain Policy Enforcement | Protects | T1098 | Account Manipulation | |
SC-7 | Boundary Protection | Protects | T1098 | Account Manipulation | |
SI-4 | System Monitoring | Protects | T1098 | Account Manipulation |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.vector.Backdoor or C2 | Backdoor or command and control channel | related-to | T1098 | Account Manipulation | |
action.malware.variety.Backdoor | Backdoor (enable remote access). Child of 'RAT' when combined with 'Trojan' | related-to | T1098 | Account Manipulation | |
attribute.integrity.variety.Modify privileges | Modified privileges or permissions | related-to | T1098 | Account Manipulation |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
aws_config | AWS Config | technique_scores | T1098 | Account Manipulation |
Comments
This control provides significant coverage for one of this technique's sub-techniques, resulting in an overall score of Minimal.
References
|
amazon_guardduty | Amazon GuardDuty | technique_scores | T1098 | Account Manipulation |
Comments
GuardDuty has a finding types that flag events where an adversary may have compromised an AWS IAM User. Finding Type: Persistence:IAMUser/AnomalousBehavior
References
|
aws_security_hub | AWS Security Hub | technique_scores | T1098 | Account Manipulation |
Comments
AWS Security Hub performs a check from the AWS Foundations CIS Benchmark that, if implemented, would help towards detecting the manipulation of accounts. AWS Security Hub provides this detection with the following check.
3.4 Ensure a log metric filter and alarm exist for IAM policy changes
This is scored as Minimal because it only supports a subset of the sub-techniques (1 of 4).
References
|
aws_identity_and_access_management | AWS Identity and Access Management | technique_scores | T1098 | Account Manipulation |
Comments
This control may generate logs for creation and manipulation of accounts but the relevant security information would be handled by another security control.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1098.003 | Add Office 365 Global Administrator Role | 12 |
T1098.001 | Additional Cloud Credentials | 20 |
T1098.002 | Exchange Email Delegate Permissions | 12 |
T1098.004 | SSH Authorized Keys | 11 |