← Back to Explore
T1589.002
Email Addresses
Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees. Adversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise...
PRE
2
Detections
2
Sources
14
Threat Actors
BY SOURCE
1sigma1splunk_escu
PROCEDURES (2)
General Monitoring1 detections
Auto-extracted: 1 detections for general monitoring
Script Execution Monitoring1 detections
Auto-extracted: 1 detections for script execution monitoring