• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Use Case
      • Abuse
      • Account Compromise
      • Adversary Tactics
      • Best Practices
      • Cloud Security
      • Data Destruction
      • Lateral Movement
      • Malware
      • Privilege Escalation
      • Ransomware
      • Unauthorized Software
      • Vulnerability

    Account Compromise

    Name Technique Tactic
    Active Directory Kerberos Attacks Password Spraying, Brute Force Credential Access
    Azure Active Directory Account Takeover Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying Resource Development
    Azure Active Directory Privilege Escalation Account Manipulation Persistence
    GCP Account Takeover Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing Resource Development
    Insider Threat Password Spraying, Brute Force Credential Access
    Office 365 Account Takeover Steal Application Access Token Credential Access
    Office 365 Persistence Mechanisms Account Manipulation, Additional Cloud Roles Persistence
    Snake Keylogger Malicious File, User Execution Execution
    Snake Malware Kernel Modules and Extensions, Service Execution Persistence
    Sneaky Active Directory Persistence Tricks Security Support Provider, Boot or Logon Autostart Execution Persistence
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.