This pattern of attack involves an adversary that uses stolen credentials to leverage remote services such as RDP, telnet, SSH, and VNC to log into a system. Once access is gained, any number of malicious activities could be performed.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
3