Uncommon access to Microsoft Teams credential files

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Unsecured Credentials (T1552)

Severity

Low

Description

Sensitive Microsoft Teams credential files were accessed.

Attacker's Goals

Accessing these files is done by attackers to collect user credentials.

Investigative actions

Investigate the actor process to determine if it was used for legitimate purposes or malicious activity.

Variations

Uncommon access to Microsoft Teams credential files by an unsigned and unpopular process

Synopsis

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Unsecured Credentials (T1552)

Severity

Low

Description

Sensitive Microsoft Teams credential files were accessed. by an unsigned and unpopular process.

Attacker's Goals

Accessing these files is done by attackers to collect user credentials.

Investigative actions

Investigate the actor process to determine if it was used for legitimate purposes or malicious activity.