Critical Infrastructure Cybersecurity Framework
T1534Lateral Move1 Mitigations

Internal Spearphishing

Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization.

Description

Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

User Training

Quick Info

Technique ID
T1534
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.