Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
9 threats — page 1 of 1
Name Category Tags Description
Unsecured Credentials Credential Access Adversaries may search compromised systems to find and obtain insecurely stored credentials. These c… Edit
Unsecured Credentials: Chat Messages Credential Access Adversaries may directly collect unsecured credentials stored or passed through user communication s… Edit
Unsecured Credentials: Cloud Instance Metadata API Credential Access Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other s… Edit
Unsecured Credentials: Container API Credential Access Adversaries may gather credentials via APIs within a containers environment. APIs in these environme… Edit
Unsecured Credentials: Credentials In Files Credential Access Adversaries may search local file systems and remote file shares for files containing insecurely sto… Edit
Unsecured Credentials: Credentials in Registry Credential Access Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Wi… Edit
Unsecured Credentials: Group Policy Preferences Credential Access Adversaries may attempt to find unsecured credentials in Group Policy Preferences (GPP). GPP are too… Edit
Unsecured Credentials: Private Keys Credential Access Adversaries may search for private key certificate files on compromised systems for insecurely store… Edit
Unsecured Credentials: Shell History Credential Access Adversaries may search the command history on compromised systems for insecurely stored credentials.… Edit