ID | Name |
---|---|
T1586.001 | Social Media Accounts |
T1586.002 | Email Accounts |
T1586.003 | Cloud Accounts |
Adversaries may compromise email accounts that can be used during targeting. Adversaries can use compromised email accounts to further their operations, such as leveraging them to conduct Phishing for Information or Phishing. Utilizing an existing persona with a compromised email account may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. Compromised email accounts can also be used in the acquisition of infrastructure (ex: Domains).
攻撃者は、攻撃中に使用することができる電子メールアカウントを侵害する可能性があります。攻撃者は、侵害したメールアカウントを利用して、Phishing for
InformationやPhishingを実施するなど、作戦を進めるために利用することができます。侵害された電子メールアカウントで既存の人物を利用することは、被害者が、侵害された人物と関係があったり、その人物について知っていたりする場合、その人物に対する信頼度を高めることができます。また、侵害されたメールアカウントは、インフラ(例:ドメイン)の取得にも利用される可能性があります。
A variety of methods exist for compromising email accounts, such as gathering credentials via Phishing for Information, purchasing credentials from
third-party sites, or by brute forcing credentials (ex: password reuse from breach credential dumps).[1] Prior to compromising email accounts, adversaries may conduct Reconnaissance to inform decisions about which
accounts to compromise to further their operation.
電子メールアカウントの侵害には、フィッシングによる情報収集、サードパーティサイトからの認証情報の購入、認証情報のブルートフォース(例:侵害された認証情報のダンプからのパスワード再利用)など、さまざまな方法があります[1]。攻撃者は、電子メールアカウントを侵害する前に、攻撃者は偵察を行い、どのアカウントを侵害すべきか判断し、作戦を進める可能性があります。
Adversaries can use a compromised email account to hijack existing email threads with targets of interest.
攻撃者は、侵害したメールアカウントを使用して、興味を持ったターゲットとの既存のメールスレッドをハイジャックすることができます。
ID | Name | Description |
---|---|---|
G0007 | APT28 |
APT28 has used compromised email accounts to send credential phishing emails.[2] |
G0016 | APT29 |
APT29 has compromised email accounts to further enable phishing campaigns.[3] |
G1001 | HEXANE |
HEXANE has used compromised accounts to send spearphishing emails.[4] |
G0136 | IndigoZebra |
IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations.[5] |
G0094 | Kimsuky |
Kimsuky has compromised email accounts to send spearphishing e-mails.[6][7] |
G0065 | Leviathan |
Leviathan has compromised email accounts to conduct social engineering attacks.[8] |
G0059 | Magic Hound |
Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.[9] |
ID | Mitigation | Description |
---|---|---|
M1056 | Pre-compromise |
This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. |
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access (ex: Phishing).