Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-19 | 0 | Top 10 Industries Targeted By Cybercriminals In 2024 | ||
Details | Website | 2024-12-19 | 3 | Are Your Mobile Devices Safe? CISA’s Must-Follow Security Practices - CloudSEK News | ||
Details | Website | 2024-12-19 | 2 | What is a Compromised Credentials Attack? | ||
Details | Website | 2024-12-19 | 18 | Exploring vulnerable Windows drivers | ||
Details | Website | 2024-12-19 | 1 | CISA Released Secure Mobile Communication Best Practices - 2025 | ||
Details | Website | 2024-12-19 | 0 | Automotive Industry Cyber Security Solutions | ||
Details | Website | 2024-12-19 | 0 | Exposing the Flaws in Our Phone System | ||
Details | Website | 2024-12-19 | 1 | Especialistas en ciberseguridad y ciberinteligencia | ||
Details | Website | 2024-12-19 | 1 | Experts in cyber security and cyber intelligence | ||
Details | Website | 2024-12-19 | 0 | Grupo Petrópolis solves mobile workforce challenges with Android Enterprise | ||
Details | Website | 2024-12-19 | 0 | Beware of Scam Emails Seeking Donations for UNICEF or Other Humanitarian Groups | ||
Details | Website | 2024-12-19 | 0 | VPN vs. ZTNA: Which is Better for Secure Remote Access? | ||
Details | Website | 2024-12-18 | 0 | Cloud Security Best Practices: Protecting Your AWS Infrastructure | ||
Details | Website | 2024-12-18 | 0 | The CIA Triad in Modern Cybersecurity | ||
Details | Website | 2024-12-18 | 3 | 🚨 Beware of New Ledger Phishing Attack: Protect Your Crypto Wallet! 🚨 | ||
Details | Website | 2024-12-18 | 0 | A Comprehensive Guide to SOC Integration with SIEM: Enhancing Security Operations | ||
Details | Website | 2024-12-18 | 2 | Cybersec Risk Focus: Multi-Stage Malware | ||
Details | Website | 2024-12-18 | 0 | Types of Logs: A Comprehensive Guide | ||
Details | Website | 2024-12-18 | 1 | CVE Alert: CVE-2024-10476 - RedPacket Security | ||
Details | Website | 2024-12-18 | 0 | What is CompTIA+? | ||
Details | Website | 2024-12-18 | 13 | Mastering Medical Device Cybersecurity: An Exhaustive Guide to Safeguarding Patient Safety and… | ||
Details | Website | 2024-12-18 | 4 | How to Lose a Fortune with Just One Bad Click | ||
Details | Website | 2024-12-18 | 0 | What is Cyber Security? | ||
Details | Website | 2024-12-18 | 0 | Quantum Cryptography: A Cybersecurity Imperative | ||
Details | Website | 2024-12-18 | 0 | Hardware Hacking Tools and Techniques: An Overview for Ethical Hackers |