ID | Name |
---|---|
T1591.005 | Search Closed Sources |
T1591.006 | Open Source Intelligence (OSINT) |
T1591.007 | Spear Phishing attacks |
Adversaries may search and gather information about victims from closed sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data. Adversaries may also purchase information from less-reputable sources such as dark web or cybercrime black-markets. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.