Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Account Discovery

Account Discovery

Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. This information can help adversaries determine which accounts exist, which can aid in follow-on behavior such as brute-forcing, spear-phishing attacks, or account takeovers (e.g.,Valid Accounts).

Adversaries may use several methods to enumerate accounts, including abuse of existing tools, built-in commands, and potential misconfigurations that leak account names and roles or permissions in the targeted environment.

For examples, cloud environments typically provide easily accessible interfaces to obtain user lists.[1][2] On hosts, adversaries can use defaultPowerShell and other command line functionality to identify accounts. Information about email addresses and accounts may also be extracted by searching an infected system’s files.

ID: T1087
Tactic:Discovery
Platforms: ESXi, IaaS, Identity Provider, Linux, Office Suite, SaaS, Windows, macOS
Contributors: Daniel Stepanic, Elastic; Microsoft Threat Intelligence Center (MSTIC); Travis Smith, Tripwire
Version: 2.6
Created: 31 May 2017
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
G0143 Aquatic Panda

Aquatic Panda used thelast command in Linux environments to identify recently logged-in users on victim machines.[3]

G1016 FIN13

FIN13 has enumerated all users and their roles from a victim's main treasury system.[4]

S1229 Havoc

Havoc can identify privileged user accounts on infected systems.[5]

G1015 Scattered Spider

Scattered Spider has identified vSphere administrator accounts.[6]

S0445 ShimRatReporter

ShimRatReporter listed all non-privileged and privileged accounts available on the machine.[7]

C0024 SolarWinds Compromise

During theSolarWinds Compromise,APT29 obtained a list of users and their roles from an Exchange server usingGet-ManagementRoleAssignment.[8]

S1239 TONESHELL

TONESHELL included functionality to retrieve a list of user accounts.[9]

S1065 Woody RAT

Woody RAT can identify administrator accounts on an infected machine.[10]

S0658 XCSSET

XCSSET attempts to discover accounts from various locations such as a user's Evernote, AppleID, Telegram, Skype, and WeChat data.[11]

Mitigations

IDMitigationDescription
M1028 Operating System Configuration

Prevent administrator accounts from being enumerated when an application is elevating through UAC since it can lead to the disclosure of account names. The Registry key is locatedHKLM\ SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CredUI\EnumerateAdministrators. It can be disabled through GPO: Computer Configuration > [Policies] > Administrative Templates > Windows Components > Credential User Interface: E numerate administrator accounts on elevation.[12]

M1018 User Account Management

Manage the creation, modification, use, and permissions associated to user accounts.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0587Enumeration of User or Account Information Across PlatformsAN1612

Detection of suspicious enumeration of local or domain accounts via command-line tools, WMI, or scripts.

AN1613

Enumeration of users and groups through suspicious shell commands or unauthorized access to /etc/passwd or /etc/shadow.

AN1614

Detection of user account enumeration through tools like dscl, dscacheutil, or loginshell enumeration via command-line.

AN1615

Detection of API calls listing users, IAM roles, or groups in cloud environments.

AN1616

Enumeration of user or role objects via IdP API endpoints or LDAP queries.

AN1617

Account enumeration via esxcli, vim-cmd, or API calls to vSphere.

AN1618

Account enumeration via bulk access to user directory features or hidden APIs.

AN1619

Account discovery via VBA macros, COM objects, or embedded scripting.

References

  1. Yonathan Klijnsma. (2016, May 17). Mofang: A politically motivated information stealing adversary. Retrieved May 12, 2020.
  2. Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.
  3. Sudeep Singh. (2025, April 16). Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1. Retrieved July 21, 2025.
  4. MalwareBytes Threat Intelligence Team. (2022, August 3). Woody RAT: A new feature-rich malware spotted in the wild. Retrieved December 6, 2022.
  5. Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021.
  6. UCF. (n.d.). The system must require username and password to elevate a running application.. Retrieved December 18, 2017.
×

[8]ページ先頭

©2009-2026 Movatter.jp