Common Information
Type Value
Value
Code Repositories - T1593.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may search public code repositories for information about victims that can be used during targeting. Victims may store code in repositories on various third-party websites such as GitHub, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Adversaries may search various public code repositories for various information about a victim. Public code repositories can often be a source of various general information about victims, such as commonly used programming languages and libraries as well as the names of employees. Adversaries may also identify more sensitive data, including accidentally leaked credentials or API keys.(Citation: GitHub Cloud Service Credentials) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Valid Accounts](https://attack.mitre.org/techniques/T1078) or [Phishing](https://attack.mitre.org/techniques/T1566)). **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1213/003), which focuses on [Collection](https://attack.mitre.org/tactics/TA0009) from private and internally hosted code repositories.
Details Published Attributes CTI Title
Details Website 2024-11-14 0 How Generative AI Will Change Jobs In Cybersecurity | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-13 2 Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem
Details Website 2024-11-09 18 BugBounty — Mastering the Basics (along with Resources)[Part-3]
Details Website 2024-11-08 0 Cybersec Netherlands 2024: Experts Unpack the Anatomy of Modern Supply Chain Breaches - CloudSEK News
Details Website 2024-11-07 4 Prevent Security Breaches in Self-Hosted Environments with GitGuardian's Custom Host for Validity Checks
Details Website 2024-11-07 0 What is OSINT? Building Blocks for Cyber Intelligence - SOS Intelligence
Details Website 2024-11-04 1 IntelBroker Threat Actor Strikes Again: Nokia’s Source Code Allegedly Compromised via Third-Party Breach - CloudSEK News
Details Website 2024-10-31 0 The future of ransomware defense | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-31 2 The Latest in Cybersecurity: Recent Vulnerabilities and Breaches to Watch
Details Website 2024-10-31 0 EmeraldWhale steals 15,000 credentials from exposed Git configurations
Details Website 2024-10-31 0 Preventing Data Breaches: How Auditing Repositories and Access Controls Protect Your Company
Details Website 2024-10-30 0 Establishing Security Guardrails in the Age of Shadow IT - Cybersecurity Insiders
Details Website 2024-10-29 2 Kimova.AI ISO 27001 Auditing Series: Technological Control A.8.4: Access to Source Code
Details Website 2024-10-28 2 Kimova.AI ISO 27001 Auditing Series: Technological Control A.8.3: Information Access Restriction
Details Website 2024-10-26 2 The Most Significant Cyberattacks in History: Techniques, Tactics, and Tools
Details Website 2024-10-24 2 The extent of Hardcoded Secrets: From Development to Production
Details Website 2024-10-23 0 Keep your secrets secret: 5 core tips — and a call to action on modernizing
Details Website 2024-10-23 2 Keep your secrets secret: 5 core tips — and a call to action on modernizing
Details Website 2024-10-23 0 Keep your secrets secret: 5 core tips — and a call to action on modernizing
Details Website 2024-10-22 1 Who is Jia Tan? What is a supply chain? Why?
Details Website 2024-10-22 97 Triad Nexus: Silent Push exposes FUNNULL CDN's ongoing corruption efforts, hosting DGA bulk domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a supply chain attack impacting 110,000+ sites - Silent Push
Details Website 2024-10-22 97 Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites - Silent Push
Details Website 2024-10-19 13 Get easy $50,000 bugbounty hunting from hackerone program
Details Website 2024-10-19 0 Cyber Recon: Tools & Techniques
Details Website 2024-10-17 199 ClickFix tactic: The Phantom Meet