Employee Names - T1589.003 (76551c52-b111-4884-bc47-ff3e728f0156)
Adversaries may gather employee names that can be used during targeting. Employee names be used to derive email addresses as well as to help guide other reconnaissance efforts and/or craft more-believable lures.
Adversaries may easily gather employee names, since they may be readily available and exposed via online or other accessible data sets (ex: Social Media or Search Victim-Owned Websites).(Citation: OPM Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: Search Open Websites/Domains or Phishing for Information), establishing operational resources (ex: Compromise Accounts), and/or initial access (ex: Phishing or Valid Accounts).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Gather Victim Identity Information - T1589 (5282dd9a-d26d-4e16-88b7-7c0f4553daf4) | Attack Pattern | Employee Names - T1589.003 (76551c52-b111-4884-bc47-ff3e728f0156) | Attack Pattern | 1 |