Common Information
Type Value
Value
Email Addresses - T1589.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees. Adversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise Email)(Citation: CNET Leaks) Email addresses could also be enumerated via more active means (i.e. [Active Scanning](https://attack.mitre.org/techniques/T1595)), such as probing and analyzing responses from authentication services that may reveal valid usernames in a system.(Citation: GrimBlog UsernameEnum) For example, adversaries may be able to enumerate email addresses in Office 365 environments by querying a variety of publicly available API endpoints, such as autodiscover and GetCredentialType.(Citation: GitHub Office 365 User Enumeration)(Citation: Azure Active Directory Reconnaisance) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Email Accounts](https://attack.mitre.org/techniques/T1586/002)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Brute Force](https://attack.mitre.org/techniques/T1110) via [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2024-10-29 6 Email Verifiers For Healthcare Industry Data Protection
Details Website 2024-10-29 0 Russia and China-linked state hackers intensify attacks on Netherlands, security officials warn | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-29 0 Hacker claims to have data linked to 19 million French mobile and internet customers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-29 0 Free ISP Breach Compromises Millions, Threat Actor Threatens Data Leak - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-29 1 US joins international action against RedLine and META Infostealers | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-29 1 Law Enforcement Operation Takes Down Redline and Meta Infostealers
Details Website 2024-10-29 2 Free ISP Breach Compromises Millions, Threat Actor Threatens Data Leak
Details Website 2024-10-29 0 Defending your personal data from dark web criminals | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-29 0 The Art of Social Engineering: Manipulating Human Trust for Cyber Gain
Details Website 2024-10-29 0 McAfee Total Protection Review: Flagship of Digital Defense
Details Website 2024-10-29 2 Nintendo Warns of Widespread Phishing Scams Targeting Users Through Fake Emails - CloudSEK News
Details Website 2024-10-29 2 Woman loses hundreds trying to 'sell a pair of pants' after Facebook Marketplace scam | #datingscams | #lovescams | #facebookscams | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting
Details Website 2024-10-29 0 Data protection made simple
Details Website 2024-10-29 0 Don't become a statistic: Defending your personal data from dark web criminals
Details Website 2024-10-28 1185 US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security
Details Website 2024-10-28 0 The Dark Side of Mobile Advertising: How Data Brokers Endanger Privacy and Violate Laws
Details Website 2024-10-28 1 The Best VPNs For Malware Protection And Privacy
Details Website 2024-10-28 1 Nordvpn Chrome Extention
Details Website 2024-10-28 0 Responding, Recovering and Whitelist VS Blacklisting
Details Website 2024-10-28 2 Change Healthcare ransomware attack exposes personal health information of over 100 million | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-28 0 Roblox Predator Problem Potentially Exposes Kids to Pedophiles | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting
Details Website 2024-10-28 4 Can I Verify Someone’s Email?
Details Website 2024-10-28 25 ReliaQuest Uncovers New Black Basta Social Engineering Technique | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-28 2 Change Healthcare ransomware attack exposes personal health information of over 100 million | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-28 4 Scammers' delivery service: exclusively dangerous | #philippines | #philippinesscams | #lovescams | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting