EXPLORE
← Back to Explore
T1591.004

Identify Roles

Adversaries may gather information about identities and roles within the victim organization that can be used during targeting. Information about business roles may reveal a variety of targetable details, including identifiable information for key personnel as well as what data/resources they have access to. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business rol...

PRE
2
Detections
1
Sources
4
Threat Actors

BY SOURCE

2sigma

PROCEDURES (1)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

DETECTIONS (2)