Search Closed Sources
Adversaries may search and gather information about victims from closed sources that can be used during targeting.
Description
Adversaries may search and gather information about victims from closed sources that can be used during targeting.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Pre-compromiseThreat Intelligence Program
Quick Info
- Technique ID
- T1597
- Tactic
- Recon
- Sub-Techniques
- 2
- Mitigations
- 2
