← All threats
MEDIUM
Stolen Credential Dump
Aggregated credentials (often from infostealer malware) appear on criminal forums. Even if your org's data isn't in this exact dump, the same playbook hits you next. Demands password monitoring (HIBP-style), MFA enforcement, session token revocation, and EDR on endpoints to stop the stealer at source.
Aggregated credentials (often from infostealer malware) appear on criminal forums. Even if your org's data isn't in this exact dump, the same playbook hits you next. Demands password monitoring (HIBP-style), MFA enforcement, session token revocation, and EDR on endpoints to stop the stealer at source.
MITRE ATT&CK
Tactics, Techniques & Procedures
TA0006 Credential Access
tactic
Defensive mapping
Mapped controls
The audit will verify each of these controls is in place and effective.
| Control | Confidence | Why it matters |
|---|---|---|
| MFA for all user accounts suggested | 75% | Recommended control for credential theft |
| Privileged access management (PAM) suggested | 75% | Recommended control for credential theft |
| Account lockout policy on failed logins suggested | 75% | Recommended control for credential theft |
| Credential rotation suggested | 75% | Recommended control for credential theft |