Common Information
Type Value
Value
Account Manipulation - T1098
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Account manipulation may aid adversaries in maintaining access to credentials and certain permission levels within an environment. Manipulation could consist of modifying permissions, modifying credentials, adding or changing permission groups, modifying account settings, or modifying how authentication is performed. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain. Detection: Collect events that correlate with changes to account objects on systems and the domain, such as event ID 4738. (Citation: Microsoft User Modified Event) Monitor for modification of accounts in correlation with other suspicious activity. Changes may occur at unusual times or from unusual systems. Especially flag events where the subject and target accounts differ (Citation: InsiderThreat ChangeNTLM July 2017) or that include additional flags such as changing a password without knowledge of the old password. (Citation: GitHub Mimikatz Issue 92 June 2017) Use of credentials may also occur at unusual times or to unusual systems or services and may correlate with other suspicious activity. Platforms: Windows Data Sources: Authentication logs, API monitoring, Windows event logs, Packet capture Permissions Required: Administrator
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-13 23 T.A. — RansomHub
Details Website 2024-11-09 19 TRACKING RANSOMWARE : OCTOBER 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-05 0 Part 2–6. Session Management Testing
Details Website 2024-11-03 35 Threat Actor — Cl0P
Details Website 2024-11-02 5 Hack The Box | Sherlock | Meerkat
Details Website 2024-10-30 28 Attacker Abuses Victim Resources to Reap Rewards from Titan Network
Details Website 2024-10-25 58 HeptaX: Unauthorized RDP Connections For Cyberespionage Operations
Details Website 2024-10-25 0 My Crash Course in Cyber Defense at B-Sides NYC
Details Website 2024-10-23 2 Climbing The Ladder | Kubernetes Privilege Escalation (Part 1)
Details Website 2024-10-17 30 Securing Continuous Delivery: Argo CD Threat Detection
Details Website 2024-10-16 108 Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations | CISA
Details Website 2024-10-10 182 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | CTF导航
Details Website 2024-10-08 0 Guiding your organization with the 2024 Elastic Global Threat Report
Details Website 2024-10-06 7 Blue Team Online Labs: Anakus
Details Website 2024-10-04 0 Part-1 MITRE ATT&CK Tactic & Techniques & framework
Details Website 2024-09-30 174 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
Details Website 2024-09-25 24 Zero Trust Protections - Illustrated
Details Website 2024-09-23 17 Mastering Cloud-Specific IOCs for Enhanced Threat Detection | Wiz Blog
Details Website 2024-09-21 39 Unmasking Advanced Threat Actors: How Cloud Identity and Access Management is Under Attack
Details Website 2024-09-12 25 Hygiene, Hygiene, Hygiene! [Guest Diary] - SANS Internet Storm Center
Details Website 2024-09-10 1 Login form NoSQL Injection + CSRF Token bypass real cases found during recent audit
Details Website 2024-09-04 4 ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor
Details Website 2024-09-03 46 Most interesting IR cases in 2023: insider threats and more