Common Information
Type | Value |
---|---|
Value |
Account Manipulation - T1098 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Account manipulation may aid adversaries in maintaining access to credentials and certain permission levels within an environment. Manipulation could consist of modifying permissions, modifying credentials, adding or changing permission groups, modifying account settings, or modifying how authentication is performed. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain. Detection: Collect events that correlate with changes to account objects on systems and the domain, such as event ID 4738. (Citation: Microsoft User Modified Event) Monitor for modification of accounts in correlation with other suspicious activity. Changes may occur at unusual times or from unusual systems. Especially flag events where the subject and target accounts differ (Citation: InsiderThreat ChangeNTLM July 2017) or that include additional flags such as changing a password without knowledge of the old password. (Citation: GitHub Mimikatz Issue 92 June 2017) Use of credentials may also occur at unusual times or to unusual systems or services and may correlate with other suspicious activity. Platforms: Windows Data Sources: Authentication logs, API monitoring, Windows event logs, Packet capture Permissions Required: Administrator |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-05-26 | 27 | Threat Intelligence Report: Understanding and Mitigating ‘Cosmic Energy’ using the MITRE ATT&CK… | ||
Details | Website | 2023-05-16 | 77 | #StopRansomware: BianLian Ransomware Group | CISA | ||
Details | Website | 2023-05-07 | 42 | The Evolution of Business Email Compromise | ||
Details | Website | 2023-05-03 | 45 | The Evolution of Business Email Compromise | ||
Details | Website | 2023-04-24 | 33 | An Adventure in Google Cloud threat detection | Datadog Security Labs | ||
Details | Website | 2023-04-20 | 481 | ATT&CK Changes | ||
Details | Website | 2023-04-17 | 9 | 2023 Vulnerabilities : First-Quarter Highlights ReliaQuest Threat Research Team – Global Security Mag Online | ||
Details | Website | 2023-03-22 | 9 | APT Profile: Sandworm - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2023-03-16 | 78 | Bee-Ware of Trigona, An Emerging Ransomware Strain | ||
Details | Website | 2023-03-07 | 9 | Account Pre-Takeover Bug Bounty | ||
Details | Website | 2023-03-02 | 199 | Russia/Ukraine Update - February 2023 | ||
Details | Website | 2023-02-28 | 44 | CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks | CISA | ||
Details | Website | 2023-02-28 | 16 | Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig | ||
Details | Website | 2023-02-13 | 261 | Dalbit (m00nlight): Chinese Hacker Group's APT Attack Campaign - ASEC BLOG | ||
Details | Website | 2023-02-10 | 0 | The MITRE Attack Chain’s Discrete Links | Fortinet Blog | ||
Details | Website | 2023-01-31 | 261 | 달빗(Dalbit,m00nlight): 중국 해커 그룹의 APT 공격 캠페인 - ASEC BLOG | ||
Details | Website | 2022-12-20 | 133 | Russia/Ukraine Update - December 2022 | ||
Details | Website | 2022-11-29 | 132 | Russia/Ukraine Update - November 2022 | ||
Details | Website | 2022-11-28 | 71 | Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia | Mandiant | ||
Details | Website | 2022-11-25 | 49 | Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester | CISA | ||
Details | Website | 2022-11-22 | 0 | A third of cyberattacks in the cloud leverage credential access | ||
Details | Website | 2022-11-18 | 19 | U.S. Federal Network Hacked – APT Hackers Compromised Domain Controller | ||
Details | Website | 2022-11-17 | 4 | SafeBreach Coverage for US-CERT Alert (AA22-320A) – Iranian State-Sponsored APT Actors | ||
Details | Website | 2022-11-16 | 32 | Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester | CISA | ||
Details | Website | 2022-10-18 | 45 | Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More |