Valid Accounts
Info
ID:
Tactic: Gain Access
Valid Accounts
Adversaries may acquire, guess, or inherit valid user credentials and use them to deliver malicious payloads under the guise of legitimate activity. This often involves logging into administrative portals, developer consoles, or back‑office services where the adversary can upload new code, modify configuration files, or plant backdoor artifacts. Because the attacker is authenticated, these actions blend with normal user behavior, making them difficult to detect at the delivery stage.
Organizations that fail to rotate credentials, employ strong password policies, or use multi‑factor authentication leave themselves vulnerable to this approach. Once inside, attackers can insert payloads into source repositories, container registries, or plugin directories - anywhere privileged users typically have write access. Such unauthorized but valid logins serve as a powerful first step to installing malicious code that will eventually be executed in the environment.
Consumer applications lacking strong password policies or multi-factor authentication are particularly vulnerable to account stuffing and account takeover attacks. Attackers can exploit reverse engineering and traffic analysis to identify vulnerabilities in the application and APIs, then use these insights to launch credential-based attacks against user accounts. This combination of reconnaissance techniques with credential attacks makes consumer-facing applications especially susceptible to unauthorized access through valid accounts.