Skip to content

Credential Access

The adversary is trying to steal account names and passwords.

Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

In cloud environments, adversaries target API keys, service account credentials, and temporary security tokens. Techniques include querying instance metadata services (IMDS), accessing secrets managers, dumping environment variables from serverless functions, and harvesting credentials from code repositories or CI/CD pipelines.

View Credential Access on MITRE ATT&CK →