Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
8 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Account Manipulation | Persistence | Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account man… | Edit | |
| Account Manipulation: Additional Cloud Credentials | Persistence | Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent acces… | Edit | |
| Account Manipulation: Additional Cloud Roles | Persistence | An adversary may add additional roles or permissions to an adversary-controlled cloud account to mai… | Edit | |
| Account Manipulation: Additional Container Cluster Roles | Persistence | An adversary may add additional roles or permissions to an adversary-controlled user or service acco… | Edit | |
| Account Manipulation: Additional Email Delegate Permissions | Persistence | Adversaries may grant additional permission levels to maintain persistent access to an adversary-con… | Edit | |
| Account Manipulation: Additional Local or Domain Groups | Persistence | An adversary may add additional local or domain groups to an adversary-controlled account to maintai… | Edit | |
| Account Manipulation: Device Registration | Persistence | Adversaries may register a device to an adversary-controlled account. Devices may be registered in a… | Edit | |
| Account Manipulation: SSH Authorized Keys | Persistence | Adversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux … | Edit |