Common Information
Type Value
Value
Business Relationships - T1591.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's business relationships that can be used during targeting. Information about an organization’s business relationships may include a variety of details, including second or third-party organizations/domains (ex: managed service providers, contractors, etc.) that have connected (and potentially elevated) network access. This information may also reveal supply chains and shipment paths for the victim’s hardware and software resources. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business relationships may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).
Details Published Attributes CTI Title
Details Website 2024-11-15 2 Supply Chain Security: The Backdoor That’s Leaving Your Business Wide Open
Details Website 2024-11-13 7 New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration - CyberSRC
Details Website 2024-11-11 2 The Hidden Costs of API Breaches: Quantifying the Long-Term Business Impact
Details Website 2024-11-07 2 Texas Data Privacy and Security Act (TDPSA)
Details Website 2024-11-07 0 Securing SMBs in a Cloud-Driven World: Best Practices for Cost-Effective Digital Hygiene Through Verified Authentication
Details Website 2024-11-05 2 SWIFT 
Details Website 2024-11-04 0 Android RAT Tool, Asus Taiwan Access, and Palo Alto Exploit Detected on Dark Web - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-04 2 Android RAT Tool, Asus Taiwan Access, and Palo Alto Exploit Detected on Dark Web
Details Website 2024-11-04 2 Handling Cross-Border Cybersecurity Breaches: US-India Legal Considerations
Details Website 2024-11-01 0 Protecting the Healthcare Supply Chain Against Russian Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-30 46 6,000+ WordPress Sites Compromised: The Threat of ClickFix Malware. (Research & Proposed Solution)
Details Website 2024-10-30 46 6,000+ WordPress Sites Compromised: The Threat of ClickFix Malware. (Complete Research)
Details Website 2024-10-26 6 The Future Of Work And Advanced VPN Adoption
Details Website 2024-10-24 0 THE FORGE FROM A CYBERSECURITY PERSPECTIVE.
Details Website 2024-10-23 44 Highlighting TA866/Asylum Ambuscade Activity Since 2021
Details Website 2024-10-19 4 Email Verification And Risk Management
Details Website 2024-10-17 0 Why is Cyber Incident Reporting Important?
Details Website 2024-10-16 4 At Nearly $1 Billion Global Impact, the Best Cloud Security Couldn’t Stop This Hybrid Attack Path. Lesson: Map and Close Viable Attack Paths Before Breaches Begin.
Details Website 2024-10-16 2 There is no magic roadmap
Details Website 2024-10-13 0 Leveraging Generative AI and AI Agents for Supplier Risk and Cybersecurity
Details Website 2024-10-11 3 Enhancing Client Trust through Secure Document Handling with Black Vault
Details Website 2024-10-11 0 A Beginner’s Guide to Cybersecurity for Global Enterprises
Details Website 2024-10-11 0 CYBERSECURITY: A CORNERSTONE OF DIGITAL NATION
Details Website 2024-10-10 1 Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools
Details Website 2024-10-10 1 Cyber Signals: Cyberthreats in K-12 and higher education | Microsoft Security Blog