T1033 - System Owner/User Discovery
Tattiche:
Discovery
Discovery
Piattaforme:
Linux macOS Network Devices Windows
Linux macOS Network Devices Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs. Adversaries may use the information from [System Owner/User Discovery](https://attack.mitre.org/techniques/T1033) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Various utilities and commands may acquire this information, including <code>whoami</code>. In macOS and Linux, the currently logged in user can be identified with <code>w</code> and <code>who</code>. On macOS the <code>dscl . list /Users | grep -v '_'</code> command can also be used to enumerate user accounts. Environment variables, such as <code>%USERNAME%</code> and <code>$USER</code>, may also be used to access this information.
On network devices, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `show users` and `show ssh` can be used to display users currently logged into the device.(Citation: show_ssh_users_cmd_cisco)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)
Various utilities and commands may acquire this information, including <code>whoami</code>. In macOS and Linux, the currently logged in user can be identified with <code>w</code> and <code>who</code>. On macOS the <code>dscl . list /Users | grep -v '_'</code> command can also be used to enumerate user accounts. Environment variables, such as <code>%USERNAME%</code> and <code>$USER</code>, may also be used to access this information.
On network devices, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `show users` and `show ssh` can be used to display users currently logged into the device.(Citation: show_ssh_users_cmd_cisco)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)
Usato da Attori (20)
APT3
Nation-state
Nation-state
APT19
Nation-state
Nation-state
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
Stealth Falcon
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
APT32
Nation-state
Nation-state
FIN8
Unknown
Unknown
MuddyWater
Nation-state
Nation-state
APT37
Nation-state
Nation-state
WIZARD SPIDER
Nation-state
Nation-state
APT39
Unknown
Unknown
FIN10
Unknown
Unknown
WindShift
Unknown
Unknown
APT41
Nation-state
Nation-state
GALLIUM
Unknown
Unknown
HAFNIUM
Unknown
Unknown
Earth Lusca
Unknown
Unknown
Volt Typhoon
Unknown
Unknown
Malware (20)
TrickBot other
PowerDuke other
RCSession other
Spark other
SynAck other
Bumblebee other
Amadey other
NOKKI other
yty other
Backdoor.Oldrea other
Get2 other
POWRUNER other
KOPILUWAK other
Linux Rabbit other
Exaramel for Linux other
HAWKBALL other
RedLeaves other
Felismus other
Havoc other
GravityRAT other
Metadata
| MITRE ID: | T1033 |
| STIX ID: | attack-pattern--03d7999c-1f4c-... |
| Piattaforme: | Linux, macOS, Network Devices, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |