CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1598Recon3 Mitigations

Phishing for Information

Adversaries may send phishing messages to elicit sensitive information that can be used during targeting.

Description

Adversaries may send phishing messages to elicit sensitive information that can be used during targeting.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Pre-compromiseThreat Intelligence ProgramUser Training

Quick Info

Technique ID
T1598
Tactic
Recon
Sub-Techniques
4
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.