EXPLORE
← Back to Explore
T1597

Search Closed Sources

Adversaries may search and gather information about victims from closed (e.g., paid, private, or otherwise not freely available) sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data. Adversaries may also purchase information from less-reputable sources such as dark web or cybercrime blackmarkets.(Citation: ZDNET Selling Data) Adver...

PRE
0
Detections
0
Sources
1
Threat Actors

THREAT ACTORS (1)

DETECTIONS (0)