Phishing for Information, Part 3: How Attackers Gather Data About Your Organization
ATT&CK techniques detected
T1589.002Email Addresses
83%
“##p rather than the actual organization. but, sometimes attackers get lucky. most of the time, they can uncover where sites are being hosted and gain some basic information about the company ’ s network configuration. in addition to the ip address information, every organization …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1589Gather Victim Identity Information
62%
“phishing for information, part 3 : how attackers gather data about your organization in parts 1 and 2 of this blog series ( how phishers bait their hooks …, and how attackers collect data about your employees ( / content / f5 - labs / en / labs / articles / threat - intelligence …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1591Gather Victim Org Information
37%
“phishing for information, part 3 : how attackers gather data about your organization in parts 1 and 2 of this blog series ( how phishers bait their hooks …, and how attackers collect data about your employees ( / content / f5 - labs / en / labs / articles / threat - intelligence …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
The Internet is full of information about your company that’s easily accessible to anyone and particularly useful to attackers.