Valid Accounts (T1078) is a MITRE ATT&CK technique in the Initial Access tactic. SOC analysts detect it by monitoring for SIEM, XDR events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, privilege escalation, or defense evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, and remote desktop. Compromised credentials may grant an adversary initial access into a network or give them access to specific systems or resources they would not have otherwise. Valid accounts can be obtained through a variety of methods including phishing, credential dumping, password spraying, purchasing credentials from criminal marketplaces, or exploiting password reuse across services. The use of legitimate credentials makes detection significantly more challenging because the activity appears normal from a purely authentication-log perspective.
“Valid Accounts is documented as technique T1078 in the MITRE ATT&CK knowledge base under the Initial Access tactic. Detection requires visibility into SIEM, XDR telemetry.”
Detection Strategies
The following detection strategies help SOC analysts identify Valid Accounts activity. These methods apply across SIEM, XDR environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.
1
Implement User and Entity Behavior Analytics to establish behavioral baselines for each account and alert on deviations such as logins at unusual hours, access to resources not previously accessed, or abnormal command execution patterns.
2
Monitor for authentication events using accounts that have been inactive for extended periods, particularly service accounts, contractor accounts, and accounts belonging to former employees that should have been disabled.
3
Track lateral movement patterns by correlating authentication events across multiple systems to identify accounts being used to authenticate to an unusually large number of systems within a short time window.
4
Alert on the use of default or commonly known credentials against internet-facing services, network devices, and internal applications that may not enforce strong password policies.
5
Correlate failed and successful authentication attempts with threat intelligence feeds containing known compromised credential lists to identify accounts whose passwords may have appeared in public data breaches.
Example Alerts
These realistic alert examples show what Valid Accounts looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.
HighSIEM
Dormant Service Account Activity Detected
Service account svc_backup_old authenticated to 12 different systems over 20 minutes, including domain controllers and file servers containing sensitive financial data. The account has shown no activity for 847 days and was scheduled for decommission. Current activity does not match any scheduled backup job window.
CriticalSIEM
Credential Stuffing Attack Successful Login
Account jdoe@company.com successfully authenticated to Office 365 after 156 failed attempts from rotating IP addresses over 2 hours. The successful authentication IP resolves to a residential proxy service commonly used to mask credential stuffing attacks. The account password matches credentials in the 2023 breach database.
HighSIEM
Impossible Travel Authentication Event
UEBA engine flagged authentication anomaly for user account agarcia. Login from New York at 14:23 UTC followed by login from Singapore at 15:01 UTC. Geographic distance and travel time make legitimate simultaneous access physically impossible, indicating compromised credentials being used from multiple locations.
Practice Detecting Valid Accounts
SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Valid Accounts. Build detection skills with zero consequences — free forever.
SOC analysts detect Valid Accounts (T1078) by monitoring SIEM, XDR telemetry for behavioral anomalies and specific indicators. Key detection methods include implement user and entity behavior analytics to establish behavioral baselines for each account and alert on deviations such as logins at unusual hour. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Valid Accounts?
Valid Accounts can be detected using SIEM, XDR platforms. SIEM tools are particularly effective for this technique because they provide visibility into the initial access phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Valid Accounts in real-world attacks?
Valid Accounts is a well-documented MITRE ATT&CK technique in the Initial Access tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Valid Accounts scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Valid Accounts for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Initial Access techniques like Valid Accounts. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.