Statements (49)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cybersecurity_Threat
|
| gptkbp:alsoKnownAs |
Credential Theft
|
| gptkbp:canAutomate |
Botnets
Credential Stuffing Tools |
| gptkbp:category |
gptkb:cybercrime
gptkb:Information_Security Attack Technique |
| gptkbp:commonVector |
Phishing Emails
Compromised Websites Fake Websites Malicious Attachments Social Media Scams |
| gptkbp:describedBy |
gptkb:MITRE_ATT&CK_Framework
|
| gptkbp:detects |
Intrusion Detection Systems
Anomalous Login Detection |
| gptkbp:example |
2012 LinkedIn Breach
2014 Yahoo Data Breach 2017 Equifax Breach |
| gptkbp:impact |
gptkb:Data_Breach
Financial Loss Reputational Damage Regulatory Penalties |
| gptkbp:mitigatedBy |
gptkb:Security_Awareness_Training
gptkb:Network_Monitoring Multi-Factor Authentication Strong Password Policies Anti-Phishing Tools |
| gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
| gptkbp:relatedTo |
gptkb:malware
Phishing Social Engineering Keylogging Man-in-the-Middle Attack |
| gptkbp:step |
gptkb:Cyber_Kill_Chain
Credential Access Initial Access |
| gptkbp:target |
Passwords
Usernames Authentication Tokens Personal Identification Numbers |
| gptkbp:usedBy |
Cybercriminals
|
| gptkbp:usedFor |
Identity Theft
Unauthorized Access Account Takeover |
| gptkbp:bfsParent |
gptkb:Responder
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Credential Harvesting
|