Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.vector.Backdoor or C2 | Backdoor or command and control channel | related-to | T1136 | Create Account | |
action.malware.variety.Modify data | Malware which compromises a legitimate file rather than creating new filess | related-to | T1136 | Create Account | |
attribute.integrity.variety.Created account | Created new user account | related-to | T1136 | Create Account |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
aws_config | AWS Config | technique_scores | T1136 | Create Account |
Comments
This control provides partial coverage for one of this technique's sub-techniques, resulting in an overall score of Minimal.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1136.003 | Cloud Account | 17 |
T1136.002 | Domain Account | 16 |
T1136.001 | Local Account | 12 |