Email Collection
Adversaries may target user email to collect sensitive information. Emails may contain sensitive data, including trade secrets or personal information, that can prove valuable to adversaries. Emails may also contain details of ongoing incident response operations, which may allow adversaries to adjust their techniques in order to maintain persistence or evade defenses.(Citation: TrustedSec OOB Communications)(Citation: CISA AA20-352A 2021) Adversaries can collect or forward email from mail serve...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 2 detections for powershell
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for attachment
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for email
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for api