Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
9 threats — page 1 of 1
Name Category Tags Description
Remote Services Lateral Movement Adversaries may use Valid Accounts to log into a service that accepts remote connections, such as te… Edit
Remote Services: Cloud Services Lateral Movement Adversaries may log into accessible cloud services within a compromised environment using Valid Acco… Edit
Remote Services: Direct Cloud VM Connections Lateral Movement Adversaries may leverage Valid Accounts to log directly into accessible cloud hosted compute infrast… Edit
Remote Services: Distributed Component Object Model Lateral Movement Adversaries may use Valid Accounts to interact with remote machines by taking advantage of Distribut… Edit
Remote Services: Remote Desktop Protocol Lateral Movement Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). T… Edit
Remote Services: SMB/Windows Admin Shares Lateral Movement Adversaries may use Valid Accounts to interact with a remote network share using Server Message Bloc… Edit
Remote Services: SSH Lateral Movement Adversaries may use Valid Accounts to log into remote machines using Secure Shell (SSH). The adversa… Edit
Remote Services: VNC Lateral Movement Adversaries may use Valid Accounts to remotely control machines using Virtual Network Computing (VNC… Edit
Remote Services: Windows Remote Management Lateral Movement Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (… Edit