🔑 Credential Theft

Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.

31 procedures8 lifecycle stages

Triage

(4 procedures)

Containment

(3 procedures)
Sponsored

Preservation

(3 procedures)

Collection

(6 procedures)

Analysis

(3 procedures)

Eradication

(7 procedures)

Recovery

(2 procedures)

Post-Incident Review

(3 procedures)