Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.[1] Credentials can then be used to perform Lateral Movement and access restricted information.
Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.
| ID | Name | Description |
|---|---|---|
| G0007 | APT28 |
APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims.[2][3][4] |
| G0050 | APT32 | |
| G0087 | APT39 |
APT39 has used different versions of Mimikatz to obtain credentials.[7] |
| G0001 | Axiom | |
| G1043 | BlackByte |
BlackByte used tools such as Cobalt Strike and Mimikatz to dump credentials from victim systems.[9][10] |
| S0030 | Carbanak | |
| G1003 | Ember Bear |
Ember Bear gathers credential material from target systems, such as SSH keys, to facilitate access to victim environments.[12] |
| S0232 | HOMEFRY | |
| G0065 | Leviathan |
Leviathan has used publicly available tools to dump password hashes, including HOMEFRY.[14] |
| S1146 | MgBot |
MgBot includes modules for dumping and capturing credentials from process memory.[15] |
| G0129 | Mustang Panda |
Mustang Panda utilized "Hdump" to dump credentials from memory.[16] |
| S0052 | OnionDuke | |
| S0048 | PinchDuke |
PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated many sources such as WinInet Credential Cache, and Lightweight Directory Access Protocol (LDAP).[17] |
| G0033 | Poseidon Group |
Poseidon Group conducts credential dumping on victims, with a focus on obtaining credentials belonging to domain and database servers.[18] |
| S0379 | Revenge RAT |
Revenge RAT has a plugin for credential harvesting.[19] |
| G0054 | Sowbug | |
| G1053 | Storm-0501 |
Storm-0501 has used the SecretsDump module within Impacket can perform credential dumping to obtain account and password information.[21] |
| G0039 | Suckfly |
Suckfly used a signed credential-dumping tool to obtain victim account credentials.[22] |
| G0131 | Tonto Team |
Tonto Team has used a variety of credential dumping tools.[23] |
| S0094 | Trojan.Karagany |
Trojan.Karagany can dump passwords and save them into |
| ID | Mitigation | Description |
|---|---|---|
| M1015 | Active Directory Configuration |
Manage the access control list for "Replicating Directory Changes All" and other permissions associated with domain controller replication. [25] [26] Consider adding users to the "Protected Users" Active Directory security group. This can help limit the caching of users' plaintext credentials.[27] |
| M1040 | Behavior Prevention on Endpoint |
On Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing. [28] |
| M1043 | Credential Access Protection |
With Windows 10, Microsoft implemented new protections called Credential Guard to protect the LSA secrets that can be used to obtain credentials through forms of credential dumping. It is not configured by default and has hardware and firmware system requirements. [29] It also does not protect against all forms of credential dumping. [30] |
| M1041 | Encrypt Sensitive Information |
Ensure Domain Controller backups are properly secured. |
| M1028 | Operating System Configuration |
Consider disabling or restricting NTLM.[31] Consider disabling WDigest authentication.[32] |
| M1027 | Password Policies |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
| M1026 | Privileged Account Management |
Windows: Linux: |
| M1025 | Privileged Process Integrity |
On Windows 8.1 and Windows Server 2012 R2, enable Protected Process Light for LSA.[34] |
| M1017 | User Training |
Limit credential overlap across accounts and systems by training users and administrators not to use the same password for multiple accounts. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0234 | Credential Dumping via Sensitive Memory and Registry Access Correlation | AN0648 |
Processes accessing LSASS memory or SAM registry hives outside of trusted security tools, often followed by file creation or lateral movement. Detects unauthorized access to sensitive OS subsystems for credential extraction. |
| AN0649 |
Processes opening /proc//mem or /proc//maps targeting credential-storing services like sshd or login. Behavior often includes high privilege escalation and memory inspection tools such as gcore or gdb. |
||
| AN0650 |
Unsigned processes accessing system memory or launching known credential scraping tools (e.g., osascript, dylib injections) to access the Keychain or sensitive memory regions. |