Hunting for credentials and building a credential type reference catalog
Adversaries are leveraging widely exposed clear text credentials to gain access to sensitive information.
At times the term “harvesting credentials” is used when red teamers emulate these attacks - which is something that appears to be more opportunistic and I would propose that security teams start to actively hunt for credential exposure that can put their organization at risk – in case you are not yet doing that.
Actively hunting for credential exposureThe idea of credential hunting is targeted and focused, leveraging intelligence about systems and combing it with powerful search techniques to identify exposure.