CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1528Cred Access1 Mitigations

Steal Application Access Token

Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.

Description

Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Restrict Web-Based Content

Quick Info

Technique ID
T1528
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.