MITRE ATT&CK Technique
Description
In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple’s keychain implementation allows these credentials to be cached so that users are not repeatedly prompted for passwords. (Citation: OS X Keychain) (Citation: External to DA, the OS X Way) Apple’s securityd utility takes the user’s logon password, encrypts it with PBKDF2, and stores this master key in memory. Apple also uses a set of keys and algorithms to encrypt the user’s password, but once the master key is found, an attacker need only iterate over the other values to unlock the final password. (Citation: OS X Keychain) If an adversary can obtain root access (allowing them to read securityd’s memory), then they can scan through memory to find the correct sequence of keys in relatively few tries to decrypt the user’s logon keychain. This provides the adversary with all the plaintext passwords for users, WiFi, mail, browsers, certificates, secure notes, etc. (Citation: OS X Keychain) (Citation: OSX Keydnap malware)
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2017-12-14T16:46:06.044Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'In OS X prior to El Capitan, users with root access can read '
'plaintext keychain passwords of logged-in users because '
'Apple’s keychain implementation allows these credentials to '
'be cached so that users are not repeatedly prompted for '
'passwords. (Citation: OS X Keychain) (Citation: External to '
'DA, the OS X Way) Apple’s securityd utility takes the user’s '
'logon password, encrypts it with PBKDF2, and stores this '
'master key in memory. Apple also uses a set of keys and '
'algorithms to encrypt the user’s password, but once the '
'master key is found, an attacker need only iterate over the '
'other values to unlock the final password. (Citation: OS X '
'Keychain)\n'
'\n'
'If an adversary can obtain root access (allowing them to read '
'securityd’s memory), then they can scan through memory to '
'find the correct sequence of keys in relatively few tries to '
'decrypt the user’s logon keychain. This provides the '
'adversary with all the plaintext passwords for users, WiFi, '
'mail, browsers, certificates, secure notes, etc. (Citation: '
'OS X Keychain) (Citation: OSX Keydnap malware)',
'external_references': [{'external_id': 'T1167',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1167'},
{'description': 'Juuso Salonen. (2012, September 5). '
'Breaking into the OS X keychain. '
'Retrieved July 15, 2017.',
'source_name': 'OS X Keychain',
'url': 'http://juusosalonen.com/post/30923743427/breaking-into-the-os-x-keychain'},
{'description': 'Alex Rymdeko-Harvey, Steve Borosh. '
'(2016, May 14). External to DA, the '
'OS X Way. Retrieved July 3, 2017.',
'source_name': 'External to DA, the OS X Way',
'url': 'http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-way'},
{'description': 'Marc-Etienne M.Leveille. (2016, July '
'6). New OSX/Keydnap malware is '
'hungry for credentials. Retrieved '
'July 3, 2017.',
'source_name': 'OSX Keydnap malware',
'url': 'https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/'}],
'id': 'attack-pattern--2715c335-1bf2-4efe-9f18-0691317ff83b',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'credential-access'}],
'modified': '2025-10-24T17:48:32.601Z',
'name': 'Securityd Memory',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': True,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': False,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['macOS'],
'x_mitre_version': '1.1'}