← Back to Explore
T1589.001
Credentials
Adversaries may gather credentials that can be used during targeting. Account credentials gathered by adversaries may be those directly associated with the target victim organization or attempt to take advantage of the tendency for users to use the same passwords across personal and business accounts. Adversaries may gather credentials from potential victims in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may als...
PRE
2
Detections
1
Sources
5
Threat Actors
BY SOURCE
2splunk_escu
PROCEDURES (2)
Process Creation Monitoring1 detections
Auto-extracted: 1 detections for process creation monitoring
Network Connection Monitoring1 detections
Auto-extracted: 1 detections for network connection monitoring