Common Information
Type | Value |
---|---|
Value |
Business Relationships - T1591.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's business relationships that can be used during targeting. Information about an organization’s business relationships may include a variety of details, including second or third-party organizations/domains (ex: managed service providers, contractors, etc.) that have connected (and potentially elevated) network access. This information may also reveal supply chains and shipment paths for the victim’s hardware and software resources. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about business relationships may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: ThreatPost Broadvoice Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2021-09-29 | 9 | Malvertising: Made in China | ||
Details | Website | 2021-06-07 | 0 | 3 Hot Internet of Things Topics at IoT StreamConf 2015 | ||
Details | Website | 2020-12-01 | 0 | The Impact of Modern Ransomware on Manufacturing Networks | ||
Details | Website | 2020-12-01 | 0 | The Impact of Modern Ransomware on Manufacturing Networks | ||
Details | Website | 2020-11-11 | 0 | 2020 Phishing and Fraud Report | F5 Labs | ||
Details | Website | 2020-04-15 | 41 | Guidance on the North Korean Cyber Threat | CISA | ||
Details | Website | 2020-04-08 | 0 | Satellite Companies, ISPs Feeling the Heat from Hackers | NETSCOUT | ||
Details | Website | 2019-12-04 | 12 | APT review: what the world’s threat actors got up to in 2019 | ||
Details | Website | 2019-11-11 | 0 | Fight Edge Vendor Sprawl | ||
Details | Website | 2019-10-04 | 0 | Third-Party Risk Management – 4 Steps for a Successful Program | ||
Details | Website | 2019-07-10 | 149 | Virus Bulletin :: VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary | ||
Details | Website | 2018-11-13 | 7 | How to get a UK IP Address with a VPN for Free [Tested 2023] | ||
Details | Website | 2018-10-10 | 1 | Thieves and Geeks: Russian and Chinese Hacking Communities | Recorded Future | ||
Details | Website | 2018-07-25 | 1 | Check Point Software Technologies Reports 2015 First Quarter Financial Results - Check Point Software | ||
Details | Website | 2018-05-13 | 0 | How to Steal a Million: The Memoirs of a Russian Hacker | ||
Details | Website | 2018-03-09 | 179 | BAD TRAFFIC: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads? | ||
Details | Website | 2016-03-16 | 6 | Rethinking Path Validation: Pt. 2 | ||
Details | Website | 2013-01-15 | 148 | Planet Blue Coat: Mapping Global Censorship and Surveillance Tools | ||
Details | Website | 2010-06-21 | 2 | Defenders of the Faith |