CAPEC 555 Remote Services with Stolen Credentials

Stable Standard Unknown Risk
Severity Very High

Description

This pattern of attack involves an adversary that uses stolen credentials to leverage remote services such as RDP, telnet, SSH, and VNC to log into a system. Once access is gained, any number of malicious activities could be performed.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

3