Credential Access
The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like IAM access and secret keys. Techniques used to get credentials include using the Cloud Instance Metadata API and finding Credentials in Files. Using legitimate credentials can give adversaries persistent access to AWS services and make them harder to detect, ultimately helping the adversary achieve their goals.
Techniques
Techniques: 3
ID | Name | Description | |
---|---|---|---|
T1552 | Unsecured Credentials |
Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History [MITRE] ), operating system or application-specific repositories (e.g. Credentials in Registry [MITRE] ), or other specialized files/artifacts (e.g. Private Keys [MITRE] ). |
|
↳ | T1552.005 | Cloud Instance Metadata API |
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. AWS Specific ContentA prerequisite for this technique is an Amazon EC2 instance hosting a vulnerable application where IMDSv2 is either configured as an optional configuration, or not configured at all. Instance metadata is data about an Amazon EC2 instance that can be used to configure or manage running instances, and can include configuration data about the EC2 instance and also security data such as credentials for attached instance profiles. If a threat actor gains the ability to compromise the application or operating system running on the EC2 instance, it may be possible for them to retrieve security credentials using the instance metadata service. The use of this technique can typically occur after a threat actor gains Initial Access into the environment through the EC2 Hosted Application Compromise |
↳ | T1552.001 | Credentials In Files |
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords. AWS Specific ContentA prerequisite of this technique is that the credentials of an AWS IAM identity are stored in an unsecured manner, either on a local file system, or on the public internet. Threat actors may search on-premise local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords. A file commonly associated with this technique is the .env file, which is an environment variable file used on some services and operating systems. This file is used to store configuration information about the host service or operating system on the host, but can also contain long-term AWS IAM credentials saved within the file. AWS credentials have also previously been found in files publicly available via GitHub and used by threat actors to gain access into an AWS account. |