Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Credentials from Password Stores: Keychain

Adversaries may collect the keychain storage data from a system to acquire credentials. Keychains are the built-in way for macOS to keep track of users' passwords and credentials for many services and features such as WiFi passwords, websites, secure notes, certificates, and Kerberos. Keychain files are located in ~/Library/Keychains/,/Library/Keychains/, and /Network/Library/Keychains/. [1] The security command-line utility, which is built into macOS by default, provides a useful way to manage these credentials.

To manage their credentials, users have to use additional credentials to access their keychain. If an adversary knows the credentials for the login keychain, then they can get access to all the other credentials stored in this vault. [2] By default, the passphrase for the keychain is the user’s logon credentials.

ID: T1555.001
Sub-technique of:  T1555
Tactic: Credential Access
Platforms: macOS
Permissions Required: Administrator
Data Sources: API monitoring, File monitoring, PowerShell logs, Process monitoring, System calls
Version: 1.0
Created: 12 February 2020
Last Modified: 17 February 2020

Procedure Examples

Name Description
Calisto

Calisto collects Keychain storage data and copies those passwords/tokens to a file.[4][5]

iKitten

iKitten collects the keychains on the system.[6]

LaZagne

LaZagne can obtain credentials from macOS Keychains.[3]

Proton

Proton gathers credentials in files for 1password and keychains.[6]

Mitigations

Mitigation Description
Password Policies

The password for the user's login keychain can be changed from the user's login password. This increases the complexity for an adversary because they need to know an additional password.

Detection

Unlocking the keychain and using passwords from it is a very common process, so there is likely to be a lot of noise in any detection technique. Monitoring of system calls to the keychain can help determine if there is a suspicious process trying to access it.

References