Adversaries may search compromised systems to find and obtain insecurely stored credentials.
The MITRE Corporation. (2024). MITRE ATT&CK Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/