An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
5