T1213.006 - Databases

Sub-technique
Tattiche:
Collection
Piattaforme:
Linux Windows macOS IaaS +1
Rilevamento:
Not specified
Description:
Adversaries may leverage databases to mine valuable information. These databases may be hosted on-premises or in the cloud (both in platform-as-a-service and software-as-a-service environments).

Examples of databases from which information may be collected include MySQL, PostgreSQL, MongoDB, Amazon Relational Database Service, Azure SQL Database, Google Firebase, and Snowflake. Databases may include a variety of information of interest to adversaries, such as usernames, hashed passwords, personally identifiable information, and financial data. Data collected from databases may be used for [Lateral Movement](https://attack.mitre.org/tactics/TA0008), [Command and Control](https://attack.mitre.org/tactics/TA0011), or [Exfiltration](https://attack.mitre.org/tactics/TA0010). Data exfiltrated from databases may also be used to extort victims or may be sold for profit.(Citation: Google Cloud Threat Intelligence UNC5537 Snowflake 2024)
Metadata
MITRE ID: T1213.006
STIX ID: attack-pattern--248d3fe1-7fe1-...
Piattaforme: Linux, Windows, macOS, IaaS, SaaS
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00