Common Information
Type Value
Value
Private Keys - T1145
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. (Citation: Wikipedia Public Key Crypto) Adversaries may gather private keys from compromised systems for use in authenticating to Remote Services like SSH or for use in decrypting other collected files such as email. Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, pfx, .cer, .p7b, .asc. Adversaries may also look in common key directories, such as <code>~/.ssh</code> for SSH keys on *nix-based systems or <code>C:\Users\(username)\.ssh\</code> on Windows. Private keys should require a password or passphrase for operation, so an adversary may also use Input Capture for keylogging or attempt to Brute Force the passphrase off-line. Adversary tools have been discovered that search compromised systems for file extensions relating to cryptographic keys and certificates. (Citation: Kaspersky Careto) (Citation: Palo Alto Prince of Persia) Detection: Monitor access to files and directories related to cryptographic keys and certificates as a means for potentially detecting access patterns that may indicate collection and exfiltration activity. Collect authentication logs and look for potentially abnormal activity that may indicate improper use of keys or certificates for remote authentication. Platforms: Linux, Windows, macOS Data Sources: File monitoring Permissions Required: User Contributors: Itzik Kotler, SafeBreach
Details Published Attributes CTI Title
Details Website 2024-11-17 1 Digital certificates
Details Website 2024-11-17 0 Buffer Overflow Attacks: Best Practices Against it in Cybersecurity.
Details Website 2024-11-16 1 The Authorities Of The Internet: Understanding Certificate Authorities
Details Website 2024-11-15 2 STOLEN NFTs RECOVERY HACKER FOR HIRE REVIEWS> BRUNOE QUICK HACK > +17057842635
Details Website 2024-11-15 0 Active Directory Certificate Services— Part 1
Details Website 2024-11-15 2 ViperSoftX: Tracking And Countering a Persistent Threat - CUJO AI
Details Website 2024-11-13 0 Day 4: Introduction to OS Security — Offensive Security Basics
Details Website 2024-11-13 2 PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025
Details Website 2024-11-13 2 Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem
Details Website 2024-11-13 0 Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023 
Details Website 2024-11-13 0 Mastering Crypto Wallet Management: Secure Your Digital Assets With Confidence 
Details Website 2024-11-12 2 "How XBANKING’s Non-Custodial Model Enhances Security and Control for DeFi Investors"
Details Website 2024-11-12 0 S/MIME vs PGP —  A Comprehensive Comparison of Email Security Protocols
Details Website 2024-11-12 3 How to connect to an Amazon EC2 Instance
Details Website 2024-11-11 2 computer & mobile forensics VS cybercrime | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-11 7 Don’t Fall for these Scams, Top Tips, Tricks & Insights to Keep You Safe & Secure in Web3 — Crypto…
Details Website 2024-11-11 0 Secret Key Exchange: Diffie-Hellman Algorithm
Details Website 2024-11-09 18 BugBounty — Mastering the Basics (along with Resources)[Part-3]
Details Website 2024-11-08 0 The Security Risks of Blockchain Technology
Details Website 2024-11-08 35 Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
Details Website 2024-11-07 2 From Secure to Vulnerable: The Impact of Quantum Computing on RSA Encryption and Other Digital…
Details Website 2024-11-07 28 What is Ryuk Ransomware? The Complete Breakdown
Details Website 2024-11-06 0 What is a Man-in-the-Middle (MITM) Attack? : A Layman’s Guide
Details Website 2024-11-06 162 Certik Skynet Quiz Answer
Details Website 2024-11-06 0 Navigating DORA: Essential IT Security and Compliance Practices for Financial Institutions