TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Credential Theft: Expanding Your Reach, Pt. II

2025-04-24 · Read original ↗

ATT&CK techniques detected

2 predictions
T1003.003NTDS
96%
"credential theft : expanding your reach, pt. ii as a follow - on to our previous blog post of the same title, sans the “ pt. ii, ” we wanted to illustrate the myriad of techniques behind the “ credential theft ” tactic, showing what many of them look like. this way, those with di…"
T1003.001LSASS Memory
32%
"leave the same artifacts in the windows event log as attaching, copying, and detaching the database. on another server within the same environment, the following processes were observed : print / d : c : \ temp \ saaas. i \ \ localhost \ c $ \ @ gmt - 2025. 04. 05 - 10. 53. 33 \ …"

Summary

As with many tactics within the MITRE ATT&CK framework, credential theft consists of a number of different techniques. Showing what many of them look like on an endpoint helps other security professionals understand what to look for and how to detect and respond to similar activity.