TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Phishing for Information, Part 5: How Attackers Pull It All Together, and How You Can Fight Back

2017-09-28 · Read original ↗

ATT&CK techniques detected

8 predictions
T1598Phishing for Information
63%
"phishing for information, part 5 : how attackers pull it all together, and how you can fight back if you missed parts 1, 2, 3, and 4 of this blog series, it ’ s probably worth visiting these links to understand why phishing scams are becoming so rampant. information about individ…"
T1589Gather Victim Identity Information
61%
"on the correct person within the organization to accept the phishing “ hook ”. this means finding the names of persons through organizational data research. the attacker ’ s goal is to identify the people in key positions who have access to the data to be hacked. barring that, at…"
T1598Phishing for Information
36%
"in the example given above. they can also go indirectly and use organizational information and spoof the company ’ s hr department to ask employees to verify basic information. 3 knowing which individuals to impersonate in hr can help solidify the phishing email. the attack doesn…"
T1591Gather Victim Org Information
35%
"on the correct person within the organization to accept the phishing “ hook ”. this means finding the names of persons through organizational data research. the attacker ’ s goal is to identify the people in key positions who have access to the data to be hacked. barring that, at…"
T1598.003Spearphishing Link
34%
"on the correct person within the organization to accept the phishing “ hook ”. this means finding the names of persons through organizational data research. the attacker ’ s goal is to identify the people in key positions who have access to the data to be hacked. barring that, at…"
T1598Phishing for Information
34%
"and identifiers instead of the names of individuals. most it folks do this anyway to reduce potential spam, but it doesn ’ t hurt to check. lastly, contracting with a good penetration testing firm to do reconnaissance and a social engineering test is a great way to see what you m…"
T1598Phishing for Information
31%
"on the correct person within the organization to accept the phishing “ hook ”. this means finding the names of persons through organizational data research. the attacker ’ s goal is to identify the people in key positions who have access to the data to be hacked. barring that, at…"
T1598.002Spearphishing Attachment
30%
"in the example given above. they can also go indirectly and use organizational information and spoof the company ’ s hr department to ask employees to verify basic information. 3 knowing which individuals to impersonate in hr can help solidify the phishing email. the attack doesn…"

Summary

Stop feeding attackers every piece of the puzzle they need to pull off their scams.