Cloud Secrets Management Stores (T1555.006)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Alessandro Brucato. (2023, July 11). SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. Retrieved September 25, 2023. Sysdig ScarletEel 2.0 2023
AWS. (n.d.). Retrieve secrets from AWS Secrets Manager. Retrieved September 25, 2023. AWS Secrets Manager
Google Cloud. (n.d.). List secrets and view secret details. Retrieved September 25, 2023. Google Cloud Secrets
Ian Ahl. (2023, September 20). LUCR-3: SCATTERED SPIDER GETTING SAAS-Y IN THE CLOUD. Retrieved September 25, 2023. Permiso Scattered Spider 2023
Microsoft. (2023, January 13). Quickstart: Set and retrieve a secret from Azure Key Vault using Azure CLI. Retrieved September 25, 2023. Microsoft Azure Key Vault