Critical Infrastructure Cybersecurity Framework
T1594Recon2 Mitigations

Search Victim-Owned Websites

Adversaries may search websites owned by the victim for information that can be used during targeting.

Description

Adversaries may search websites owned by the victim for information that can be used during targeting.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Pre-compromiseThreat Intelligence Program

Quick Info

Technique ID
T1594
Tactic
Recon
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.