EXPLORE
← Back to Explore
T1589

Gather Victim Identity Information

Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, security question responses, etc.) as well as sensitive details such as credentials or multi-factor authentication (MFA) configurations. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org...

PRE
1
Detections
1
Sources
9
Threat Actors

BY SOURCE

1sigma

PROCEDURES (1)

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

DETECTIONS (1)