← Back to Explore
T1589
Gather Victim Identity Information
Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, security question responses, etc.) as well as sensitive details such as credentials or multi-factor authentication (MFA) configurations. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org...
PRE
1
Detections
1
Sources
9
Threat Actors
BY SOURCE
1sigma
PROCEDURES (1)
Cloud Monitoring1 detections
Auto-extracted: 1 detections for cloud monitoring