Unsecured Credentials

Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History), operating system or other specialized files/artifacts (e.g. Private Keys).

ID: T2039
Sub-techniques:  T2039.001, T2039.002, T2039.003, T2039.004
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1552

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.