| ID | Name | 
|---|---|
| T1069.001 | Local Groups | 
| T1069.002 | Domain Groups | 
| T1069.003 | Cloud Groups | 
Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
Commands such as net localgroup of the Net utility, dscl . -list /Groups on macOS, and groups on Linux can list local groups.
| ID | Name | Description | 
|---|---|---|
| G0018 | admin@338 | 
                                                             admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups:   | 
                                        
| S0521 | BloodHound | 
                                                             BloodHound can collect information about local groups and members.[2]  | 
                                        
| C0015 | C0015 | 
                                                             During C0015, the threat actors used the command   | 
                                        
| S0572 | Caterpillar WebShell | 
                                                             Caterpillar WebShell can obtain a list of local groups of users from a system.[4]  | 
                                        
| G0114 | Chimera | 
                                                             Chimera has used   | 
                                        
| S0154 | Cobalt Strike | 
                                                             Cobalt Strike can use   | 
                                        
| S0082 | Emissary | 
                                                             Emissary has the capability to execute the command   | 
                                        
| S0091 | Epic | |
| S1179 | Exbyte | 
                                                             Exbyte checks whether the process is running with privileged local access during execution.[9]  | 
                                        
| S0696 | Flagpro | 
                                                             Flagpro has been used to execute the   | 
                                        
| S0381 | FlawedAmmyy | 
                                                             FlawedAmmyy enumerates the privilege level of the victim during the initial infection.[11][12]  | 
                                        
| S1198 | Gomir | 
                                                             Gomir checks the effective group ID of its process when initially executed to determine if it is in group 0, denoting superuser privileges in Linux environments.[13]  | 
                                        
| S0170 | Helminth | |
| G1001 | HEXANE | 
                                                             HEXANE has run   | 
                                        
| S0201 | JPIN | |
| S0265 | Kazuar | 
                                                             Kazuar gathers information about local groups and members.[17]  | 
                                        
| S0236 | Kwampirs | 
                                                             Kwampirs collects a list of users belonging to the local users and administrators groups with the commands   | 
                                        
| S1141 | LunarWeb | |
| S0039 | Net | 
                                                             Commands such as   | 
                                        
| G0049 | OilRig | 
                                                             OilRig has used   | 
                                        
| C0012 | Operation CuckooBees | 
                                                             During Operation CuckooBees, the threat actors used the   | 
                                        
| C0014 | Operation Wocao | 
                                                             During Operation Wocao, threat actors used the command   | 
                                        
| S0165 | OSInfo | |
| S0378 | PoshC2 | 
                                                             PoshC2 contains modules, such as   | 
                                        
| S0184 | POWRUNER | 
                                                             POWRUNER may collect local group information by running   | 
                                        
| S0650 | QakBot | 
                                                             QakBot can use   | 
                                        
| S0692 | SILENTTRINITY | 
                                                             SILENTTRINITY can obtain a list of local groups and members.[30]  | 
                                        
| S0060 | Sys10 | 
                                                             Sys10 collects the group name of the logged-in user and sends it to the C2.[31]  | 
                                        
| G0131 | Tonto Team | 
                                                             Tonto Team has used the   | 
                                        
| G0010 | Turla | 
                                                             Turla has used   | 
                                        
| G1017 | Volt Typhoon | 
                                                             Volt Typhoon has run   | 
                                        
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description | 
|---|---|---|---|
| DET0114 | Behavioral Detection of Local Group Enumeration Across OS Platforms | AN0317 | 
                                 Detects attempts to enumerate local groups via Net.exe, PowerShell, or native API calls that precede lateral movement or privilege abuse.  | 
                
| AN0318 | 
                                 Detects enumeration of local groups using common binaries (groups, getent, cat /etc/group) or scripting with suspicious lineage.  | 
                ||
| AN0319 | 
                                 Detects use of dscl or id/group commands to enumerate local system groups, often by post-exploitation tools or persistence checks.  |