Search Victim-Owned Websites
Adversaries may search websites owned by the victim for information that can be used during targeting.
Description
Adversaries may search websites owned by the victim for information that can be used during targeting.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Pre-compromiseThreat Intelligence Program
Quick Info
- Technique ID
- T1594
- Tactic
- Recon
- Mitigations
- 2
