Unsecured Credentials: Credentials In Files

Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords.

ID: T2039.002
Sub-technique of:  T2039
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1552.001

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.