The foundational reconnaissance technique where adversaries build comprehensive organizational profiles , mapping locations, relationships, tempo, and roles to craft devastatingly targeted attacks.
23 global offices identified. Headquarters: San Francisco, CA. Regional hubs: London, Tokyo, Singapore. Satellite offices mapped with satellite imagery and public permits.
47 third-party vendors cataloged. Key relationships: AWS, Salesforce, Deloitte. Supply chain dependencies mapped across 12 critical service providers.
Standard business hours: 08:00–18:00 local time. Quarterly closes: last Friday. Reduced staffing on holidays and weekends , peak vulnerability windows identified.
C-suite executives, VP-level directors, and their executive assistants profiled. Travel patterns analyzed via social media and conference attendance records.
The gateway technique that transforms generic attacks into surgical strikes
T1591 is the overarching organizational reconnaissance technique , it represents the adversary's systematic effort to understand WHO the target organization is, WHERE they operate geographically and digitally, WHEN their teams work and when defenses are weakest, and WHO holds the keys to kingdom within the corporate hierarchy. This is not passive intelligence collection; it is the deliberate assembly of a strategic attack profile. Every piece of organizational data harvested through T1591's four sub-techniques feeds directly into more sophisticated attack chains , from whaling emails impersonating the CFO, to supply chain compromises through trusted vendors, to physical social engineering timed to office moves. Organizations that treat this data as public and harmless are handing adversaries the blueprint they need to bypass nearly every technical control in their security stack. The statistics below illustrate the devastating real-world impact of organizational intelligence gathering when combined with social engineering and targeted intrusion campaigns.
Understanding the language of organizational reconnaissance
Gather Victim Org Information (T1591) is a MITRE ATT&CK reconnaissance technique where adversaries collect comprehensive intelligence about a target organization , including physical locations, business relationships, operating tempo, and organizational roles. This intelligence enables attackers to craft highly targeted social engineering campaigns, time attacks for maximum impact during periods of reduced staffing or heightened stress, select the most valuable individuals for impersonation or coercion, and exploit business partnerships for supply chain compromise. T1591 encompasses four distinct sub-techniques , T1591.001 (Determine Physical Locations), T1591.002 (Business Relationships), T1591.003 (Identify Business Tempo), and T1591.004 (Identify Roles) , each addressing a specific dimension of organizational exposure that adversaries methodically exploit.
T1591 feeds directly into the Pre-ATT&CK and later stages of the kill chain. The intelligence gathered here informs Target Selection (which individuals or systems to pursue), Spear-phishing Preparation (crafting believable lure content), Supply Chain Targeting (identifying vulnerable third-party partners), and Physical Access Planning (understanding building layouts and security schedules). Adversaries typically combine OSINT from public sources (LinkedIn, SEC filings, job postings, press releases, Google Maps) with passive reconnaissance (DNS records, WHOIS, certificate transparency logs) to build a multi-layered organizational profile without triggering any defensive alerts.
Think of T1591 like a corporate spy preparing to infiltrate a company. Before stepping foot inside, they learn which buildings the company occupies (locations), who their suppliers and clients are (relationships), when the office is busiest and when security is thinnest (tempo), and who the decision-makers are (roles). They build a complete organizational profile that reveals every vulnerability, every weak point, and every opportunity for exploitation. Just as a master chess player studies their opponent's patterns before making the first move, an adversary using T1591 patiently assembles every fragment of publicly available organizational data into a strategic intelligence dossier , one that transforms a random, noisy phishing attempt into a devastatingly precise social engineering operation capable of compromising an entire enterprise through a single well-crafted email to the right person at the right time.
How T1591 enabled a $12.5 million whaling attack
Axiom Dynamics' corporate website, LinkedIn, press releases, and SEC filings freely disclosed office locations, executive biographies, partnership announcements, and quarterly earnings schedules. A nation-state APT group spent 4 months building a comprehensive organizational profile. They identified that the CFO traveled to the London office monthly (physical locations), used a specific cloud accounting platform (business relationships), conducted quarterly closings on the last Friday of each month (tempo), and that the CFO's executive assistant had recently been hired (roles). They crafted a whaling attack impersonating the CFO to the assistant, requesting an urgent wire transfer timed to coincide with the quarterly close when the finance team was overwhelmed.
Sarah implemented a comprehensive organizational exposure reduction program that fundamentally changed Axiom Dynamics' public footprint. She removed detailed office addresses from all public-facing websites and replaced them with generic regional contact forms. She established strict non-disclosure protocols for partnership announcements, ensuring vendor relationships were never publicly enumerated. Executive travel schedules were randomized and communicated only through encrypted channels. All executive assistants underwent mandatory verification procedure training with simulated whaling exercises conducted quarterly. AI-powered email authentication was deployed across the organization, detecting impersonation attempts with 99.7% accuracy. The result: zero successful social engineering incidents in the following 18 months and a 94% reduction in targeted phishing emails reaching employee inboxes.
Systematically reducing your organizational exposure to T1591 reconnaissance
Begin by cataloging every piece of organizational information publicly available about your company. Search SEC filings, press releases, LinkedIn company pages, job postings, Google Maps listings, domain WHOIS records, certificate transparency logs, and social media profiles. Document what each data point reveals and assess which combinations create exploitable intelligence patterns. Assign risk ratings to each exposure category.
DETECT EXPOSURERemove specific street addresses from public-facing websites. Replace with regional contact forms or PO boxes for general correspondence. Audit Google Maps and Bing Maps business listings to ensure satellite imagery doesn't reveal sensitive infrastructure. Implement visitor management policies that prevent external mapping of office layouts. Consider removing floor plans and building photos from marketing materials and real estate listings.
PREVENT LEAKAGECreate clear guidelines governing what partnership information can be publicly shared. Avoid announcing specific technology vendors, service providers, or supply chain relationships unless operationally necessary. Require legal and security review of all press releases, case studies, and marketing materials that reference third-party relationships. Implement NDA frameworks that address public disclosure of business partnerships.
PREVENT LEAKAGERandomize predictable patterns such as maintenance windows, financial closing schedules, and executive travel routines. Avoid publishing earnings call schedules, product launch dates, or quarterly planning timelines in advance. Vary meeting schedules and communication patterns so that adversaries cannot establish reliable behavioral baselines. Use out-of-office responses sparingly and without revealing specific future availability patterns.
PREVENT PREDICTIONImplement least-privilege publishing policies for organizational charts and reporting structures. Remove detailed executive biographies from public websites, replacing them with minimal role descriptions. Train executives on social media OPSEC , limiting public posts about work activities, travel, and professional relationships. Establish executive communication channels that are separate from publicly discoverable email addresses and phone numbers.
REDUCE TARGETSDeploy multi-layered email authentication (SPF, DKIM, DMARC) configured to reject rather than quarantine fraudulent messages. Implement AI-powered email analysis that detects whaling attempts by analyzing communication pattern deviations. Conduct regular social engineering simulations targeting executive assistants, finance teams, and HR personnel. Establish secondary verification channels for high-value transactions and sensitive requests.
ACTIVE DEFENSEDeploy automated OSINT monitoring tools that continuously scan for new organizational information appearing across public sources. Monitor paste sites, dark web forums, data broker aggregators, and social media for mentions of your organization's employees, locations, and relationships. Establish alert thresholds that trigger security reviews when new organizational data appears. Conduct quarterly red team OSINT exercises to measure your external exposure footprint over time.
CONTINUOUS MONITORINGAvoid these pitfalls and adopt proven defensive strategies
Understanding T1591 from both sides of the cybersecurity battlefield
Hunting for indicators of T1591 reconnaissance activity targeting your organization
Monitor for anomalous LinkedIn profile view patterns targeting your organization's employees. Multiple profile views from accounts with no mutual connections, newly created profiles, or accounts listing competitor companies may indicate adversarial reconnaissance. Track referral sources in your website analytics for suspicious LinkedIn-originating traffic spikes.
Monitor WHOIS query logs for bulk lookups of your organizational domains. Track DNS enumeration patterns in authoritative name server logs. Unusual TXT record queries, SPF/DKIM record lookups, and subdomain brute-force attempts indicate an adversary is mapping your digital infrastructure alongside your organizational structure.
Monitor which external IPs and user agents are scraping your careers page. Adversaries analyze job postings to determine technology stacks (from required skills), organizational structure (from reporting relationships), and security tools deployed (from security-specific role requirements). Unusual download patterns of job descriptions warrant investigation.
Monitor for bulk downloads of publicly hosted PDFs, presentations, and documents from your website. Adversaries extract metadata including author names, organizational unit structures, software versions, and internal paths. A spike in document downloads from a single IP range often precedes a targeted campaign.
T1591 encompasses four specialized sub-techniques, each addressing a critical dimension of organizational reconnaissance. Explore each one to understand specific attack vectors, detection strategies, and defensive countermeasures.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.