EXPLORE
← Back to Explore
T1589.002

Email Addresses

Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees. Adversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise...

PRE
2
Detections
2
Sources
14
Threat Actors

BY SOURCE

1sigma1splunk_escu

PROCEDURES (2)

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

DETECTIONS (2)