Credential Theft

Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.

Triage

4 procedures

Containment

3 procedures
Sponsored

Preservation

3 procedures

Collection

6 procedures

Analysis

3 procedures

Eradication

7 procedures

Recovery

2 procedures

Post-Incident Review

3 procedures