Cyber Pulse Academy

Latest News
T1589.001, Reconnaissance

Credentials

Adversaries harvest login credentials, passwords, API keys, session tokens, through breaches, phishing, and dark web marketplaces...
⚠ INTERCEPTED
DATA EXFIL
🕵 Dark Web Marketplace
LIVE FEED 16B+ records
j.smithj.sm***@gmail.comqW3!tRBreached
m.chenmc***@corp.ioS7$yNpPhished
a.kumarak***@bank.comB4#mKxBreached
[email protected]ad***@summitfs.com●●●●●●●●●●●●●NEW
s.jonessj***@health.orgLp9@fGScraped
r.patelrp***@gov.usXk2%hVBreached
🔑 Credential Strength Analysis
password123
WEAK
Summer2024!
MEDIUM
xK9$mQ2&vL7@nW4
STRONG
🔓
Compromised
🔓
Compromised
🔒
MFA Protected
🔓
Compromised
🔒
Secured
Credentials Leaked in 2025
1
2
3
4
5
6
7
8
9
0
6
7
8
9
0
1
2
3
4
5
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
0
1
2
3
4
5
6
7
8
9
+
The largest credential breach in internet history
PHISHING
BREACH SCRAPE
DARK WEB BUY
STUFFING

Why Credential Gathering Matters

Critical Threat: Credential gathering is the most impactful identity reconnaissance technique in the modern threat landscape. Stolen credentials are the top initial access vector, initiating 22% of all breaches in 2025 according to the Verizon DBIR as reported by Vectra AI. The scale of the problem is staggering: 16 BILLION passwords were leaked in 2025 alone, the largest credential breach in internet history, encompassing credentials from Google, Meta, Apple, and countless other platforms, as documented by Cybernews. Account takeover attacks increased by 250% in 2024 (LinkedIn/Shane Brown) and account compromise surged by 389% according to Vectra's threat research. Malicious actors systematically use stolen credentials for credential-stuffing attacks to infiltrate enterprise systems, leveraging the fact that the average person reuses passwords across multiple services, making a single breach a gateway to dozens of downstream compromises across unrelated platforms and organizations worldwide.

16B+
Credentials Leaked in 2025
22%
Breaches Initiated by Stolen Credentials
389%
Surge in Account Compromise
250%
Increase in ATO Attacks (2024)

Credential theft is the number one initial access vector in modern cyberattacks according to Vectra's comprehensive threat intelligence reports. Adversaries no longer need to find zero-day vulnerabilities or execute sophisticated exploits when they can simply purchase valid credentials for pennies on dark web marketplaces. The economics of credential-based attacks are devastating: a single valid credential pair costs as little as $0.50 on underground forums, while the average cost of a credential-driven breach exceeds $4.5 million. Organizations that fail to monitor for breached credentials, enforce unique password policies, and implement multi-factor authentication are effectively leaving their front doors wide open. The attack chain is remarkably simple, obtain credentials from a breach database, test them against target services using automated credential-stuffing tools, and leverage successful authentications to establish persistent access, escalate privileges, and move laterally through the network. This is why T1589.001 remains one of the most frequently observed sub-techniques across all industry sectors and threat actor profiles.

Key Terms & Concepts

📚 Simple Definition

Credentials (T1589.001) is a sub-technique within MITRE ATT&CK's Reconnaissance tactic where adversaries gather login credentials, usernames, passwords, API keys, session tokens, cookies, and authentication certificates, through various means including phishing campaigns, purchasing from dark web marketplaces, exploiting data breaches, or scraping compromised databases. This sub-technique is classified under the parent technique T1589 (Gather Victim Identity Information), which falls within the broader Reconnaissance tactic (TA0043). Gathered credentials serve multiple downstream attack purposes: credential stuffing (automated testing of leaked username-password pairs against other services to exploit password reuse), password spraying (testing a small number of common passwords against many accounts to avoid lockout detection), and direct account takeover (using valid credentials to impersonate legitimate users and gain unauthorized access to systems, data, and privileged operations). The technique targets both individual personal accounts and organizational enterprise credentials, with the latter commanding significantly higher prices on underground markets due to their potential for access to sensitive corporate networks, intellectual property, and financial systems.

💡 Everyday Analogy

Imagine someone finds a master key ring at a hotel front desk. That single key ring contains keys to every room in the building, the lobby, the maintenance closet, the manager's office, and every guest room. The person doesn't need to pick any locks, bypass any security systems, or trick any employees, they just try each key until they find one that works, then walk right in. Stolen credentials work exactly the same way: attackers obtain massive lists of username-password pairs from data breaches (the equivalent of finding the master key ring), and systematically test them across hundreds of services and platforms, knowing that 65% of people reuse passwords across multiple accounts. A password exposed in a breached fitness app from three years ago might still unlock an employee's corporate VPN, email, cloud storage, and banking portal today. Each successful match is like finding an open door, no exploit required, no alarm triggered, and the legitimate user has no idea their identity has been hijacked until the damage is already done.

🔎 Related Terminology

TermDefinitionRelevance to T1589.001
Credential StuffingAutomated testing of breached credential pairs against multiple servicesPrimary downstream attack using gathered credentials
Password SprayingTesting common passwords against many accounts to avoid lockoutsComplementary technique leveraging credential lists
Account Takeover (ATO)Unauthorized access to a user account using valid credentialsEnd goal of credential gathering operations
Credential DumpingExtracting credentials from memory or system stores post-compromiseDifferent technique (T1003) but related outcome
Session HijackingStealing session tokens to impersonate authenticated usersTargets session credentials specifically

Real-World Scenario

👤 Marcus Johnson, Director of IT Security, Summit Financial Services

A regional bank serving 200,000 customers across 12 branches in the southeastern United States, with 450 employees and growing digital banking operations managing $2.3 billion in assets under management.

🔴 Before: The Breach Chain

Summit Financial Services had no breached credential monitoring in place and no formal password reuse policies for employees. An employee in the accounting department had been using the same password, "Summit2023!", across their work VPN, corporate email, personal banking, and a popular fitness tracking application. When that fitness app suffered a data breach, the employee's credentials were dumped onto a dark web marketplace along with 47 million other records from the same breach. The attackers purchased the credential list for $150, ran automated credential-stuffing tools against the VPN portal of Summit Financial, and within 48 hours had gained access to the employee's VPN account. From there, they moved laterally through the internal network using standard administrative tools, eventually compromising the customer database containing 85,000 account records including names, Social Security numbers, account balances, and transaction histories. The breach went undetected for 14 days until a customer reported unauthorized transactions on their account. The total damage included $4.2 million in regulatory fines under financial data protection laws (GLBA and state-level regulations), $7.8 million in total remediation costs including forensic investigation, customer notification, credit monitoring services, and network infrastructure upgrades, and an incalculable loss of customer trust that resulted in a 12% decline in new account openings over the following quarter.

🟢 After: The Recovery & Hardening

Marcus Johnson led a comprehensive credential security overhaul following the breach. First, he implemented automated breached credential monitoring by integrating the Have I Been Pwned API into the organization's identity management system, enabling real-time alerts whenever employee credentials appeared in known breach databases. Second, he enforced unique, randomly generated passwords across all systems using an enterprise password manager deployment, eliminating password reuse across 100% of employee accounts within 30 days. Third, he deployed multi-factor authentication (MFA) on all external-facing services including the VPN portal, webmail, customer-facing applications, and all administrative access points, with hardware security keys for privileged accounts. Fourth, he implemented conditional access policies that evaluated login attempts based on device health, geographic location, time of access, and risk score, automatically blocking suspicious authentication attempts. Fifth, he launched a company-wide password hygiene training program with mandatory quarterly refresher courses and simulated phishing exercises to maintain employee awareness. The result: credential-based attack attempts dropped by 94% within the first quarter, and zero successful credential-based intrusions were detected in the subsequent 18 months, transforming Summit Financial from a vulnerable target into a hardened organization with industry-leading credential security practices.

$4.2M
Regulatory Fines
$7.8M
Total Remediation Cost
94%
Drop in Credential Attacks
85,000
Records Compromised

7-Step Credential Defense Guide

01

Audit and Monitor for Breached Credentials

Continuously monitor your organization's domains and employee email addresses against known breach databases to detect when credentials have been exposed. This is the foundational step, you cannot protect what you do not know has been compromised.

  • Integrate Have I Been Pwned (HIBP) API or similar breach notification services into your identity management system
  • Use tools like Microsoft Secure Score, Google Password Checkup, or SpyCloud for enterprise breach monitoring
  • Set up automated alerts to trigger within 24 hours of any credential exposure detection
  • Conduct quarterly credential exposure audits across all corporate domains and subsidiaries
02

Enforce Strong, Unique Password Policies

Eliminate password reuse across all systems by deploying an enterprise password manager and enforcing minimum complexity requirements. The goal is to ensure that a breach on any external service never compromises your organization's credentials.

  • Deploy an enterprise password manager (1Password Business, Bitwarden, Dashlane Business) to all employees
  • Enforce minimum 16-character passwords with passphrase support enabled across all systems
  • Block known breached passwords using services like Azure AD Password Protection or custom banned lists
  • Eliminate mandatory periodic password rotations (NIST SP 800-63B guidance) to reduce unsafe behaviors
03

Deploy Multi-Factor Authentication (MFA) Everywhere

MFA is the single most effective defense against credential-based attacks. Even if an attacker obtains valid credentials, they cannot authenticate without the second factor, effectively neutralizing credential stuffing and password spraying campaigns.

  • Require MFA on all external-facing services: VPN, webmail, cloud applications, remote desktop, and admin panels
  • Prioritize FIDO2/WebAuthn hardware security keys (YubiKey, etc.) for privileged and admin accounts
  • Use push-based authenticator apps (Microsoft Authenticator, Google Authenticator) as minimum for all users
  • Disable SMS-based OTP where possible due to SIM-swapping vulnerabilities; use TOTP or push as minimum fallback
04

Implement Conditional Access Policies

Go beyond static authentication by evaluating every login attempt against contextual risk factors. Conditional access policies can automatically block or challenge suspicious authentication attempts even when valid credentials are used.

  • Configure risk-based authentication that evaluates device health, IP reputation, and behavioral patterns
  • Block or step-up authentication for logins from impossible travel scenarios or unfamiliar geographic locations
  • Enforce compliance checks requiring up-to-date operating systems and endpoint protection before granting access
  • Implement session timeouts and re-authentication requirements for sensitive operations and privileged actions
05

Deploy Credential Stuffing Detection

Actively detect and block automated credential-stuffing attacks targeting your login portals. Attackers use massive botnets to test thousands of credential pairs per minute, and your defenses must identify and block this behavior in real-time.

  • Deploy rate limiting and account lockout policies with progressive delays to slow automated testing
  • Implement bot detection using CAPTCHA challenges, behavioral analysis, and device fingerprinting technologies
  • Monitor for anomalous authentication patterns: high-volume failures, distributed login attempts, unusual user-agent strings
  • Use WAF rules and API gateway protections to detect and block credential-stuffing tool signatures
06

Secure Session Management and Cookies

Credentials extend beyond passwords to include session tokens, cookies, and API keys. Adversaries who steal active session tokens can bypass authentication entirely, making session security a critical component of credential defense.

  • Implement HTTPOnly, Secure, and SameSite flags on all authentication cookies to prevent XSS and CSRF exploitation
  • Use short-lived session tokens with automatic rotation and secure refresh token mechanisms
  • Bind sessions to device fingerprints and IP ranges to detect and invalidate hijacked sessions
  • Audit all API endpoints for exposed authentication credentials, hardcoded keys, and insecure token storage
07

Establish a Password Lifecycle Management Program

Create a comprehensive program that manages credentials from creation through retirement, including onboarding provisioning, ongoing monitoring, and secure deprovisioning when employees leave or change roles.

  • Implement automated provisioning and deprovisioning integrated with HR systems (SCIM-based identity lifecycle)
  • Run continuous credential exposure monitoring with automated remediation workflows and escalation procedures
  • Conduct regular purple team exercises simulating credential-based attack scenarios to validate defenses
  • Maintain a credential incident response playbook with defined roles, communication templates, and recovery procedures

Common Mistakes & Best Practices

❌ Common Mistakes

  • Relying solely on password complexity requirements without monitoring for breaches, complex passwords that have been leaked are just as dangerous as simple ones, and attackers don't care about your complexity policy when they already have the plaintext from a breach database.
  • Implementing MFA only on select services while leaving VPNs, legacy applications, or internal portals unprotected, attackers will find and exploit the weakest link in your authentication chain, making partial MFA deployment effectively useless against determined adversaries.
  • Ignoring third-party and shadow IT credential exposure, employees use unauthorized SaaS applications, personal email for work tasks, and shared credentials across teams, all of which create blind spots that credential monitoring must address but often doesn't.
  • Using SMS-based MFA as the primary second factor despite well-documented SIM-swapping attacks that allow adversaries to intercept SMS codes and bypass authentication entirely, rendering the MFA investment ineffective.
  • Failing to revoke credentials promptly when employees depart or change roles, orphaned accounts with active credentials remain in Active Directory, cloud platforms, and SaaS applications for months or years after the employee leaves, creating persistent backdoors.

✓ Best Practices

  • Deploy continuous breach monitoring across all corporate domains, employee email addresses, and known credential pairs, integrate automated APIs from HIBP, SpyCloud, or Recorded Future into your SIEM for real-time alerting and immediate remediation workflows.
  • Enforce phishing-resistant MFA universally using FIDO2 hardware security keys for all privileged accounts and push-based authenticator apps for standard users, eliminating SMS entirely and requiring MFA on 100% of systems including legacy applications.
  • Implement zero-trust architecture with continuous verification of every access request regardless of network location, combining device health checks, behavioral analytics, and risk scoring to make credential-based lateral movement significantly harder.
  • Automate credential lifecycle management with HR-integrated provisioning and deprovisioning, automated password rotation for service accounts and API keys, and real-time orphaned account detection to eliminate credential-related blind spots.
  • Conduct regular credential security assessments including credential-stuffing simulations, breach exposure audits, MFA coverage reviews, and purple team exercises that specifically test your organization's resilience against T1589.001-style credential gathering and exploitation.

Red Team vs Blue Team View

☠ RED TEAM

Offensive Perspective

From the red team's perspective, T1589.001 is often the path of least resistance into a target organization. Rather than investing in zero-day exploitation or complex social engineering campaigns, credential gathering provides a high-probability, low-cost initial access vector that blends in with legitimate user behavior. The red team begins by identifying the target's credential attack surface: corporate email formats, SaaS application footprints, VPN endpoints, and web-facing authentication portals. Using OSINT techniques, they correlate employee names from LinkedIn with corporate email patterns to build target lists. They then query breach databases and dark web marketplaces for matching credential pairs, prioritizing recent breaches and financial services employees whose credentials command premium prices. The subsequent credential-stuffing campaign is executed using distributed infrastructure to avoid rate-limiting and IP-based detection, with automated tools testing hundreds of credential pairs per minute across every identified authentication endpoint. Successful authentications are immediately catalogued and used to establish persistent access through VPN sessions, OAuth token theft, and browser cookie extraction, creating a foothold that is nearly indistinguishable from legitimate user activity and extremely difficult for defenders to detect through conventional monitoring.

Credential Stuffing Dark Web Markets Breached DBs Phishing Kits Session Hijacking

🛡 BLUE TEAM

Defensive Perspective

The blue team's approach to defending against T1589.001 must be layered and proactive, recognizing that credential exposure is effectively inevitable in the modern threat landscape. The defensive strategy operates across three pillars: prevention, detection, and response. Prevention focuses on reducing the attack surface by enforcing MFA on every authentication endpoint, deploying enterprise password managers to eliminate password reuse, and implementing conditional access policies that evaluate login context beyond the credential itself. Detection requires monitoring for the indicators of credential-based attacks: abnormal authentication volumes from distributed IP ranges, impossible travel patterns, unusual user-agent strings associated with known credential-stuffing tools, and authentication failures followed by unexpected successes. Integration with breach notification services enables the blue team to proactively identify when organizational credentials have been exposed and force password resets before attackers can exploit them. Response protocols must include automated credential revocation workflows, session termination procedures, and forensic investigation capabilities to determine the scope of any successful credential-based compromise. The blue team must also advocate for organizational culture change around password practices, recognizing that technical controls alone are insufficient without employee awareness and buy-in.

SIEM Monitoring MFA Enforcement Breach APIs IAM Policies WAF Rules

Threat Hunter's Eye

👁 Hunting for Credential Gathering Indicators

Threat hunters investigating potential T1589.001 activity should focus on behavioral patterns that distinguish legitimate user authentication from credential-based attacks. The primary hypothesis to test is: "An adversary is testing known breached credentials against our authentication infrastructure." This requires analyzing authentication logs across all systems for statistical anomalies that indicate automated testing rather than human behavior, and correlating these findings with known breach databases to confirm that the credentials being tested have been previously exposed.

🔎 Key Hunt Queries

// Query 1: High-volume authentication failures from distributed IPs
index=auth sourcetype=oauth OR vpn OR web
| stats count dc(src_ip) by user
| where count > 20 AND dc(src_ip) > 5
| sort -count

// Query 2: Authentication from known-malicious IPs after breach publication
index=auth action=failure
| lookup threat_intel_ip.csv src_ip OUTPUT is_malicious, threat_actor
| where is_malicious=true
| stats count by user, src_ip, threat_actor
| join user [inputlookup breached_credentials.csv]

// Query 3: Impossible travel, success from two geographies within 30min
index=auth action=success
| streamstats time_window=30m max(_time) as max_t min(_time) as min_t by user
| eval travel_delta=max_t - min_t
| eval geo_distance=geo_distance(src_geo, prev_geo)
| where travel_delta < 1800 AND geo_distance > 500
| table user, src_ip, src_geo, _time

📈 Detection Opportunities

Authentication Anomalies

Monitor for burst patterns of authentication failures (10+ failures per minute from a single user), distributed authentication attempts from geographically dispersed IPs within short time windows, and credential-stuffing tool signatures in user-agent strings such as known bot libraries and headless browser identifiers.

Breach Correlation

Cross-reference all authentication events with known breach databases. When a user authenticates successfully with a credential that appeared in a breach published within the last 90 days, flag the event as high-priority for investigation regardless of whether MFA was involved, as it indicates the user has not changed their password post-breach.

Behavioral Baseline Deviations

Establish per-user authentication baselines including typical login times, geographic locations, device types, and access patterns. Deviations from established baselines, particularly first-time authentications from new devices or locations combined with previously seen credentials, should trigger stepped-up verification requirements.

Continue Exploring

🔒 Credential Security is Everyone's Responsibility

T1589.001 represents one of the most prevalent and impactful sub-techniques in the MITRE ATT&CK framework. Whether you are a security analyst hunting for credential-based attacks, a blue team defender implementing proactive monitoring, or a red team operator testing your organization's resilience, understanding how adversaries gather and exploit credentials is essential to building an effective defense posture. The statistics are clear: stolen credentials are the number one initial access vector, and the 16-billion-record breach of 2025 has made credential-based attacks easier and more scalable than ever before. Take action today by auditing your organization's credential exposure, implementing the seven-step defense guide outlined above, and fostering a culture of password hygiene that makes credential-based attacks significantly harder to execute.

Explore related techniques in the Gather Victim Identity Information family:

Credentials


DONATE · SUPPORT

We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution - no matter the size - makes this platform sustainable.
100% of your support goes to the platform. No corporate sponsors, just the community.
ROOT::DONATE

Leave a Comment

Your email address will not be published. Required fields are marked *



Ask ChatGPT
Set ChatGPT API key
Find your Secret API key in your ChatGPT User settings and paste it here to connect ChatGPT with your Courses LMS website.
Certification Courses
Hands-On Labs
Threat Intelligence
Latest Cyber News
MITRE ATT&CK Breakdown
All Cyber Keywords

Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.

Choose the amount of donation by yourself.