Common Information
Type Value
Value
Password Managers - T1555.005
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 2019) Password managers are applications designed to store user credentials, normally in an encrypted database. Credentials are typically accessible after a user provides a master password that unlocks the database. After the database is unlocked, these credentials may be copied to memory. These databases can be stored as files on disk.(Citation: ise Password Manager February 2019) Adversaries may acquire user credentials from password managers by extracting the master password and/or plain-text credentials from memory.(Citation: FoxIT Wocao December 2019)(Citation: Github KeeThief) Adversaries may extract credentials from memory via [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212).(Citation: NVD CVE-2019-3610) Adversaries may also try brute forcing via [Password Guessing](https://attack.mitre.org/techniques/T1110/001) to obtain the master password of a password manager.(Citation: Cyberreason Anchor December 2019)
Details Published Attributes CTI Title
Details Website 2024-11-17 12 Inclusive Security: Building Digital Security For Disabled
Details Website 2024-11-17 0 The DANGER of Weak Passwords: Are You Really Safe? 🔐
Details Website 2024-11-17 0 Bagaimana Kamu Menyimpan Password?
Details Website 2024-11-16 0 Best Practices for Maintaining Cybersecurity in a Home Office
Details Website 2024-11-16 0 Top 10 Best Password Managers In 2025
Details Website 2024-11-16 0 How Internet Security Protects You from Cyber Threats
Details Website 2024-11-16 3 Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies
Details Website 2024-11-15 0 🚨New Glove Infostealer Malware Bypasses Chrome’s Cookie Encryption: A Growing Threat 🚨
Details Website 2024-11-15 2 ViperSoftX: Tracking And Countering a Persistent Threat - CUJO AI
Details Website 2024-11-15 0 Best Internet Security Suites: Top Picks for Safety!
Details Website 2024-11-14 0 Master the Cybersecurity Basics and Safeguard Your Digital Life
Details Website 2024-11-14 35 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 34 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 0 What is Safe Browsing Tools?: Enhance Your Online Security
Details Website 2024-11-14 0 Essential Cybersecurity Tips for Small Businesses
Details Website 2024-11-14 0 New Glove Stealer malware bypasses Chrome's cookie encryption
Details Website 2024-11-14 0 New Glove infostealer malware bypasses Chrome’s cookie encryption
Details Website 2024-11-13 2 Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem
Details Website 2024-11-12 2 Why do we need a popular culture of cybersecurity in 2025?
Details Website 2024-11-12 19 New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia - CyberSRC
Details Website 2024-11-12 13 Lessons from the Data Breach at Mt Hira College
Details Website 2024-11-11 2 Researchers Detailed Credential Abuse Cycle
Details Website 2024-11-11 6 Cybersecurity Experiments You Can Try at Home
Details Website 2024-11-10 0 The Cybersecurity Starter Kit: Essential Tools and Resources for Beginners — Gear Up for Digital…
Details Website 2024-11-10 0 Top 5 Cybersecurity Best Practices Every Business Should Follow