| ID | Name |
|---|---|
| T1078.001 | Default Accounts |
| T1078.002 | Domain Accounts |
| T1078.003 | Local Accounts |
| T1078.004 | Cloud Accounts |
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.
Local Accounts may also be abused to elevate privileges and harvest credentials through OS Credential Dumping. Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement.
| ID | Name | Description |
|---|---|---|
| G0016 | APT29 |
APT29 targets dormant or inactive user accounts, accounts belonging to individuals no longer at the organization but whose accounts remain on the system, for access and persistence.[1] |
| G0050 | APT32 |
APT32 has used legitimate local admin account credentials.[2] |
| S0154 | Cobalt Strike |
Cobalt Strike can use known credentials to run commands and spawn processes as a local user account.[3][4] |
| S0367 | Emotet |
Emotet can brute force a local admin password, then use it to facilitate lateral movement.[5] |
| G0051 | FIN10 |
FIN10 has moved laterally using the Local Administrator account.[6] |
| G0046 | FIN7 |
FIN7 has used compromised credentials for access as SYSTEM on Exchange servers.[7] |
| G0125 | HAFNIUM |
HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers.[8] |
| G0094 | Kimsuky |
Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP.[9] |
| C0049 | Leviathan Australian Intrusions |
Leviathan used captured local account information, such as service accounts, for actions during Leviathan Australian Intrusions.[10] |
| S1202 | LockBit 3.0 |
LockBit 3.0 can use a compromised local account for lateral movement.[11] |
| S0368 | NotPetya |
NotPetya can use valid credentials with PsExec or |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation.[14] |
| G1040 | Play |
Play has used valid local accounts to gain initial access.[15] |
| G0056 | PROMETHIUM |
PROMETHIUM has created admin accounts on a compromised host.[16] |
| G1041 | Sea Turtle |
Sea Turtle compromised cPanel accounts in victim environments.[17] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used compromised local accounts to access victims' networks.[18] |
| G0081 | Tropic Trooper |
Tropic Trooper has used known administrator account credentials to execute the backdoor directly.[19] |
| G0010 | Turla |
Turla has abused local accounts that have the same password across the victim’s network.[20] |
| S0221 | Umbreon |
Umbreon creates valid local users to provide access to the system.[21] |
| G1047 | Velvet Ant |
Velvet Ant accessed vulnerable Cisco switch devices using accounts with administrator privileges.[22] |
| ID | Mitigation | Description |
|---|---|---|
| M1032 | Multi-factor Authentication |
Enable multi-factor authentication (MFA) for local accounts to add an extra layer of protection against credential theft and misuse. MFA can be implemented using methods like mobile-based authenticators or hardware tokens, even in environments that do not rely on domain controllers or cloud services. This additional security measure can help reduce the risk of adversaries gaining unauthorized access to local systems and resources. |
| M1027 | Password Policies |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
| M1026 | Privileged Account Management |
Audit local accounts permission levels routinely to look for situations that could allow an adversary to gain wide access by obtaining credentials of a privileged account. [23] [24] Limit the usage of local administrator accounts to be used for day-to-day operations that may expose them to potential adversaries. For example, audit the use of service accounts in Kubernetes, and avoid automatically granting them access to the Kubernetes API if this is not required.[25] Implementing LAPS may also help prevent reuse of local administrator credentials across a domain.[26] |
| M1018 | User Account Management |
Enforce user account management practices for local accounts to limit access and remove inactive or unused accounts. By doing so, you reduce the attack surface available to adversaries and prevent unauthorized access to local systems. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0407 | Detection of Local Account Abuse for Initial Access and Persistence | AN1137 |
Detects anomalous usage of local accounts to log into a system, especially accounts not typically used interactively or outside business hours. |
| AN1138 |
Detects interactive or service logins from local accounts outside expected operational context or at anomalous times. |
||
| AN1139 |
Detects abnormal or rare logins via local accounts through system or remote mechanisms such as SSH. |