Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Credentials from Password Stores Credential Access Adversaries may search for common password storage locations to obtain user credentials. Passwords a… Edit
Credentials from Password Stores: Cloud Secrets Management Stores Credential Access Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secret… Edit
Credentials from Password Stores: Credentials from Web Browsers Credential Access Adversaries may acquire credentials from web browsers by reading files specific to the target browse… Edit
Credentials from Password Stores: Keychain Credential Access Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS cred… Edit
Credentials from Password Stores: Password Managers Credential Access Adversaries may acquire user credentials from third-party password managers. Password managers are a… Edit
Credentials from Password Stores: Securityd Memory Credential Access An adversary with root access may gather credentials by reading securityd’s memory. securityd is a s… Edit
Credentials from Password Stores: Windows Credential Manager Credential Access Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stor… Edit