T1078.002 - Domain Accounts
Sub-technique
Tattiche:
Persistence Privilege Escalation Defense Evasion Initial Access
Persistence Privilege Escalation Defense Evasion Initial Access
Piattaforme:
ESXi Linux macOS Windows
ESXi Linux macOS Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts)
Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) or password reuse, allowing access to privileged resources of the domain.
Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) or password reuse, allowing access to privileged resources of the domain.
Usato da Attori (18)
APT3
Nation-state
Nation-state
Naikon
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
APT5
Unknown
Unknown
INDRIK SPIDER
Unknown
Unknown
TA505
Unknown
Unknown
WIZARD SPIDER
Nation-state
Nation-state
ToddyCat
Unknown
Unknown
Volt Typhoon
Unknown
Unknown
Aquatic Panda
Unknown
Unknown
Play
Unknown
Unknown
Sandworm Team
Unknown
Unknown
Cinnamon Tempest
Unknown
Unknown
Magic Hound
Unknown
Unknown
Chimera
Unknown
Unknown
Threat Group-1314
Unknown
Unknown
BlackByte
Unknown
Unknown
Agrius
Unknown
Unknown
Metadata
| MITRE ID: | T1078.002 |
| STIX ID: | attack-pattern--c3d4bdd9-2cfe-... |
| Piattaforme: | ESXi, Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |