APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

T1552 - Unsecured Credentials

Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Shell History), operating system or application-specific repositories (e.g. Credentials in Registry), or other spe...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Shell History), operating system or application-specific repositories (e.g. Credentials in Registry), or other specialized files/artifacts (e.g. Private Keys).(Citation: Brining MimiKatz to Unix)

ATT&CK ID
T1552
STIX ID
attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517
Name
Unsecured Credentials
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

Source

Where this page information comes from.