← Back to Explore
T1591.004
Identify Roles
Adversaries may gather information about identities and roles within the victim organization that can be used during targeting. Information about business roles may reveal a variety of targetable details, including identifiable information for key personnel as well as what data/resources they have access to. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business rol...
PRE
2
Detections
1
Sources
4
Threat Actors
BY SOURCE
2sigma
PROCEDURES (1)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring