๐
Credential Theft
Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.
31 runbook nodes8 lifecycle stages covered
Triage
(4 nodes)Containment
(3 nodes)Preservation
(3 nodes)Collection
(6 nodes)Phishing Artifact Collection: Headers, URLs, Attachments
P1Phishing Artifact Collection
60min
View node
EDR Telemetry Collection
P2EDR Collection
120min
View node
M365 Unified Audit Log Collection
P2M365 UAL Collection
90min
View node
Azure AD Sign-In and Audit Log Collection
P2Azure AD Logs
60min
View node
Identify Alternative Evidence When Primary Logs Are Missing
P2Missing Log Fallback
60min
View node
Coordinate Log Collection from Third-Party Vendors
P3Third-Party Logs
120min
View node
Analysis
(3 nodes)Eradication
(7 nodes)Remove Malware, Backdoors, and Persistence Mechanisms
P1Malware Removal
120min
View node
Mass Credential Reset and Session Invalidation
P1Credential Reset
90min
View node
Comprehensive Persistence Mechanism Sweep
P1Persistence Hunt
120min
View node
Eradication Verification Checklist
P1Eradication Verification
90min
View node
Phishing Remediation: Purge, Reset, Revoke
P1Phishing Remediation
60min
View node
Patch Exploited Vulnerabilities to Prevent Re-Compromise
P2Patch Vulnerability
60min
View node
Post-Incident Configuration Hardening
P2Config Hardening
180min
View node