EXPLORE
← Back to Explore
T1110.004

Credential Stuffing

Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The information may be useful to an adversary attempting to compromise accounts by taking advantage of the tendency for users to use the same passwords across personal and business accounts. Cred...

WindowsSaaSIaaSLinuxmacOSContainersNetwork DevicesOffice SuiteIdentity ProviderESXi
21
Detections
2
Sources
1
Threat Actors

BY SOURCE

12splunk_escu9elastic

PROCEDURES (11)

Credential4 detections

Auto-extracted: 4 detections for credential

Authentication Monitoring2 detections

Auto-extracted: 2 detections for authentication monitoring

Brute Force2 detections

Auto-extracted: 2 detections for brute force

Azure2 detections

Auto-extracted: 2 detections for azure

Unusual2 detections

Auto-extracted: 2 detections for unusual

Aws2 detections

Auto-extracted: 2 detections for aws

Lateral2 detections

Auto-extracted: 2 detections for lateral

Credential2 detections

Auto-extracted: 2 detections for credential

Credential1 detections

Auto-extracted: 1 detections for credential

Brute Force1 detections

Auto-extracted: 1 detections for brute force

Cloud1 detections

Auto-extracted: 1 detections for cloud

THREAT ACTORS (1)

DETECTIONS (21)