Credential Theft
Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.
Triage
4 proceduresContainment
3 proceduresP1
Credential and Account Lockdown
~45 min
P1
Revoke Cloud Sessions and Tokens
~30 min
P1
Phishing Containment: Block, Quarantine, Purge
~45 min
Sponsored
Preservation
3 proceduresCollection
6 proceduresP1
Phishing Artifact Collection: Headers, URLs, Attachments
~60 min
P2
EDR Telemetry Collection
~120 min
P2
M365 Unified Audit Log Collection
~90 min
P2
Azure AD Sign-In and Audit Log Collection
~60 min
P2
Identify Alternative Evidence When Primary Logs Are Missing
~60 min
P3
Coordinate Log Collection from Third-Party Vendors
~120 min
Analysis
3 proceduresEradication
7 proceduresP1
Remove Malware, Backdoors, and Persistence Mechanisms
~120 min
P1
Mass Credential Reset and Session Invalidation
~90 min
P1
Comprehensive Persistence Mechanism Sweep
~120 min
P1
Eradication Verification Checklist
~90 min
P1
Phishing Remediation: Purge, Reset, Revoke
~60 min
P2
Patch Exploited Vulnerabilities to Prevent Re-Compromise
~60 min
P2
Post-Incident Configuration Hardening
~180 min