Gather Victim Org Information: Search Closed Sources

Adversaries may search and gather information about victims from closed sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data. Adversaries may also purchase information from less-reputable sources such as dark web or cybercrime black-markets. [1]

ID: T1591.005
Sub-technique of:  T1591
Tactic: Reconnaissance
Platforms: None
Version: 2.0
Created: 19 April 2023
Last Modified: 05 February 2025

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References