WHOIS - T1596.002 (166de1c6-2814-4fe5-8438-4e80f76b169f)
Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) responsible for allocating and assigning Internet resources such as domain names. Anyone can query WHOIS servers for information about a registered domain, such as assigned IP blocks, contact information, and DNS nameservers.(Citation: WHOIS)
Adversaries may search WHOIS data to gather actionable information. Threat actors can use online resources or command-line utilities to pillage through WHOIS data for information about potential victims. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: Active Scanning or Phishing for Information), establishing operational resources (ex: Acquire Infrastructure or Compromise Infrastructure), and/or initial access (ex: External Remote Services or Trusted Relationship).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Search Open Technical Databases - T1596 (55fc4df0-b42c-479a-b860-7a6761bcaad0) | Attack Pattern | WHOIS - T1596.002 (166de1c6-2814-4fe5-8438-4e80f76b169f) | Attack Pattern | 1 |