Credential Acquisition

ID: TAC-02
Phase: Resource Development

The adversary is trying to steal account names, passwords and authentication tokens. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals. Methods used to get credentials include phishing, keylogging and extracting from dumped credentials.