MITRE ATT&CK / T1556
T1556
Modify Authentication Process
Description
Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using [Valid Accounts](https://attack.mitre.org/techniques/T1078).Adversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.
Platforms
Mitigations
- M1024 — Restrict Registry Permissions
- M1032 — Multi-factor Authentication
- M1027 — Password Policies
- M1022 — Restrict File and Directory Permissions
- M1018 — User Account Management
- M1026 — Privileged Account Management
- M1025 — Privileged Process Integrity
- M1047 — Audit
- M1028 — Operating System Configuration
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- PamDOORa: New Linux Backdoor Sells for $900 on Russian Forum, Harvests SSH Credentials via PAM
- PRC State-Sponsored Telecom Router Compromise Detection: CISA AA25-239a Breakdown
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →