<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>T1589 &#8211; Cyber Pulse Academy</title>
	<atom:link href="https://www.cyberpulseacademy.com/tag/t1589/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cyberpulseacademy.com</link>
	<description></description>
	<lastBuildDate>Thu, 02 Apr 2026 16:07:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://files.servewebsite.com/2023/07/ea224bb3-generated-image-1763134673008-enlarge.png</url>
	<title>T1589 &#8211; Cyber Pulse Academy</title>
	<link>https://www.cyberpulseacademy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Employee Names &#8211; T1589.003</title>
		<link>https://www.cyberpulseacademy.com/employee-names-t1589-003/</link>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 03:17:35 +0000</pubDate>
				<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[Reconnaissance]]></category>
		<category><![CDATA[T1589]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=12567</guid>

					<description><![CDATA[Employee Names MITIGATIONS Pre-compromise M1056 DETECTION STRATEGY Detection of Hardware DET0887 DONATE · SUPPORT We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution &#8211; no matter the size &#8211; makes this platform sustainable. 100% of your support goes to the platform. No corporate sponsors, just the community. ROOT::DONATE Donate Now Cyber Pulse Academy February 13, 2026]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="12567" class="elementor elementor-12567" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-22c6d04 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="22c6d04" data-element_type="container">
		<div class="elementor-element elementor-element-68d5a4d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="68d5a4d" data-element_type="container">
				<div class="elementor-element elementor-element-8de620d elementor-widget elementor-widget-template" data-id="8de620d" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="12460" class="elementor elementor-12460" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-9ebdec3 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="9ebdec3" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-8c4036a elementor-widget elementor-widget-html" data-id="8c4036a" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<!-- Floating Particles -->
<div class="particles" aria-hidden="true">
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
</div>

<!-- ======== HERO / SIMULATION ======== -->
<header class="hero" id="simulation">
  <div class="hero-bg" aria-hidden="true"></div>
  <div class="grid-lines" aria-hidden="true"></div>

  <div class="sim-wrapper">
    <div class="hero-title">
      <span class="tag">T1589.003, Reconnaissance</span>
      <h1>Gather Victim Identity Information: Employee Names</h1>
      <div class="subtitle">Adversaries collect employee names from LinkedIn, corporate sites, and social media to craft targeted social engineering attacks...</div>
    </div>

    <!-- LinkedIn-Style Profile Scraping Simulation -->
    <div class="scrape-sim" aria-label="Animated CSS-only LinkedIn-style employee name scraping simulation">

      <!-- LinkedIn Profile Panel (Left) -->
      <div class="li-profile">
        <div class="li-header"><span class="li-logo">&#9679;</span> LINKEDIN, PROFILE SCRAPE</div>
        <div class="li-avatar">&#128100;</div>
        <div class="li-name">Sarah J. Chen</div>
        <div class="li-title">VP of Engineering</div>
        <div class="li-company">Nexus Technologies Inc.</div>
        <div class="li-field">Email: sarah.chen@nexustech.com</div>
        <div class="li-field">Location: San Francisco, CA</div>
        <div class="li-field">Connections: 847</div>
        <div class="li-field">Dept: Engineering &amp; DevOps</div>
        <div class="li-field">Reports to: Marcus Webb (CEO)</div>
      </div>

      <!-- Scraped Data Output (Right) -->
      <div class="scrape-output">

        <!-- Employee Name Cards Grid -->
        <div class="name-cards-title">// EXTRACTED EMPLOYEE RECORDS</div>
        <div class="name-cards">
          <div class="name-card">
            <div class="nc-name">Marcus Webb</div>
            <div class="nc-title">Chief Executive Officer</div>
            <div class="nc-dept">Executive</div>
            <div class="nc-email">marcus.webb@nexus...</div>
          </div>
          <div class="name-card">
            <div class="nc-name">Sarah J. Chen</div>
            <div class="nc-title">VP of Engineering</div>
            <div class="nc-dept">Engineering</div>
            <div class="nc-email">sarah.chen@nexus...</div>
          </div>
          <div class="name-card">
            <div class="nc-name">David Okonkwo</div>
            <div class="nc-title">IT Infrastructure Lead</div>
            <div class="nc-dept">Information Technology</div>
            <div class="nc-email">d.okonkwo@nexus...</div>
          </div>
          <div class="name-card">
            <div class="nc-name">Rachel Torres</div>
            <div class="nc-title">Head of HR</div>
            <div class="nc-dept">Human Resources</div>
            <div class="nc-email">r.torres@nexus...</div>
          </div>
          <div class="name-card">
            <div class="nc-name">James Mitchell</div>
            <div class="nc-title">CFO</div>
            <div class="nc-dept">Finance</div>
            <div class="nc-email">j.mitchell@nexus...</div>
          </div>
          <div class="name-card">
            <div class="nc-name">Priya Sharma</div>
            <div class="nc-title">Security Analyst</div>
            <div class="nc-dept">InfoSec</div>
            <div class="nc-email">p.sharma@nexus...</div>
          </div>
        </div>

        <!-- Social Graph Visualization -->
        <div class="social-graph-title">// SOCIAL GRAPH, ORGANIZATIONAL CONNECTIONS</div>
        <div class="social-graph">
          <!-- Graph Lines -->
          <div class="graph-line gl-1" aria-hidden="true"></div>
          <div class="graph-line gl-2" aria-hidden="true"></div>
          <div class="graph-line gl-3" aria-hidden="true"></div>
          <div class="graph-line gl-4" aria-hidden="true"></div>
          <div class="graph-line gl-5" aria-hidden="true"></div>
          <div class="graph-line gl-6" aria-hidden="true"></div>
          <!-- Connection Dots -->
          <div class="conn-dot" aria-hidden="true"></div>
          <div class="conn-dot" aria-hidden="true"></div>
          <div class="conn-dot" aria-hidden="true"></div>
          <div class="conn-dot" aria-hidden="true"></div>
          <!-- Graph Nodes -->
          <div class="graph-node center-node gn-1" data-label="M.Webb">&#128100;</div>
          <div class="graph-node gn-2" data-label="S.Chen">&#128100;</div>
          <div class="graph-node gn-3" data-label="J.Mitchell">&#128100;</div>
          <div class="graph-node gn-4" data-label="D.Okonkwo">&#128100;</div>
          <div class="graph-node gn-5" data-label="R.Torres">&#128100;</div>
          <div class="graph-node gn-6" data-label="P.Sharma">&#128100;</div>
          <div class="graph-node gn-7" data-label="A.Lopez">&#128100;</div>
        </div>

        <!-- Email Derivation Pipeline -->
        <div class="social-graph-title">// ATTACK PIPELINE: NAME &rarr; EMAIL &rarr; PHISH</div>
        <div class="email-pipeline">
          <div class="ep-stage">Employee Name<br><strong>Sarah J. Chen</strong></div>
          <div class="ep-arrow">&rarr;</div>
          <div class="ep-stage">Derived Email<br><strong>s.chen@nexus.com</strong></div>
          <div class="ep-arrow">&rarr;</div>
          <div class="ep-stage">Crafted Phishing<br><strong>"Urgent: Q4 Review"</strong></div>
        </div>

        <!-- Pretext Building Panel -->
        <div class="pretext-panel">
          <div class="pretext-title">// PRETEXT ASSEMBLY</div>
          <div class="pretext-line">[1] Target: Sarah Chen, VP Engineering at Nexus Technologies</div>
          <div class="pretext-line">[2] Context: Company just raised Series C, press release dated Oct 15</div>
          <div class="pretext-line">[3] Relationship: Reports to CEO Marcus Webb, confirmed via LinkedIn</div>
          <div class="pretext-line">[4] Pretext: Impersonate Marcus Webb requesting urgent wire transfer</div>
          <div class="pretext-line">[5] Email: "Sarah, I need you to authorize the ACME vendor payment ASAP"</div>
          <div class="pretext-line">[6] Result: 73% probability of target engagement (based on urgency + authority)</div>
        </div>

      </div>

      <!-- Scan Effects -->
      <div class="scan-overlay" aria-hidden="true"></div>
      <div class="scan-beam" aria-hidden="true"></div>

      <!-- Progress Bar -->
      <div class="progress-wrapper">
        <div class="progress-label">IDENTITY HARVEST PROGRESS</div>
        <div class="progress-bar">
          <div class="progress-fill"></div>
        </div>
      </div>
    </div>

    <!-- Status Indicators -->
    <div class="status-bar" aria-label="Identity gathering status">
      <div class="status-indicator">
        <span class="status-dot"></span>
        PROFILE SCRAPE
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        EMAIL DERIVE
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        GRAPH MAP
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        PRETEXT BUILD
      </div>
    </div>
  </div>
</header>

<!-- ======== SECTION 2: WHY IT MATTERS ======== -->
<section id="why" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 02</div>
      <h2>Why Employee Names Matter in Cyberattacks</h2>
      <div class="divider"></div>
    </div>

    <!-- Stat Boxes -->
    <div class="stat-grid">
      <div class="stat-box">
        <div class="stat-number red">70%+</div>
        <div class="stat-label">of data breaches involve social engineering (Verizon DBIR via miniOrange)</div>
      </div>
      <div class="stat-box">
        <div class="stat-number purple">60%</div>
        <div class="stat-label">fell victim to AI-generated phishing emails, matching human-crafted success rates (Harvard/brside.com)</div>
      </div>
      <div class="stat-box">
        <div class="stat-number pink">+442%</div>
        <div class="stat-label">increase in vishing (voice phishing) attacks in H2 2024 (LinkedIn/Cybersecurity Ventures)</div>
      </div>
      <div class="stat-box">
        <div class="stat-number cyan">+47%</div>
        <div class="stat-label">increase in AI-enabled cyberattacks (Cybersecurity Ventures)</div>
      </div>
      <div class="stat-box">
        <div class="stat-number red">+1,265%</div>
        <div class="stat-label">overall phishing surge (LinkedIn)</div>
      </div>
    </div>

    <div class="glass-card">
      <p>
        <strong class="text-purple">Employee names are the foundation of social engineering.</strong> Knowing who works where and in what role lets attackers craft convincing impersonations that bypass both technical controls and human skepticism. When an adversary can address a victim by name, reference their manager, mention their department's recent project, and speak knowledgeably about the company's organizational structure, the resulting illusion of legitimacy is extraordinarily difficult to detect. This is not theoretical, it is the opening move in the vast majority of targeted attacks today, from business email compromise (BEC) to spear phishing to pretext-driven phone scams.
      </p>
	  <br>
      <p>
        According to the Verizon Data Breach Investigations Report (cited via miniOrange), <strong class="text-red">social engineering accounts for more than 70% of global data breaches.</strong> The human element remains the weakest link in virtually every security program, and employee names are the key that unlocks it. A Harvard study found that <strong class="text-purple">60% of participants fell victim to AI-generated phishing emails</strong>, matching the success rate of carefully crafted human-written ones, demonstrating that when attackers combine known names with AI personalization, the threat becomes even more potent.
      </p>
	  <br>
      <p>
        The threat landscape is accelerating dramatically. <strong class="text-cyan">Vishing (voice phishing) attacks jumped 442% in the second half of 2024 alone</strong>, as reported by Cybersecurity Ventures via LinkedIn. Simultaneously, <strong class="text-green">AI-enabled cyberattacks increased by 47%</strong>, enabling adversaries to automate and scale their reconnaissance efforts, including the mass harvesting of employee names from publicly available sources. Phishing overall surged an extraordinary <strong class="text-red">1,265%</strong>, driven by the convergence of AI tools and the ever-growing trove of personal data available online.
      </p>
	  <br>
      <p>
        <strong class="text-purple">Attackers use Google dorking, LinkedIn profile scraping, WHOIS database lookups, corporate website enumeration, and social media monitoring</strong> to collect employee names and associated intelligence (source: LinkedIn MITRE ATT&amp;CK article). OSINT becomes a powerful weapon in the hands of adversaries, transforming publicly available information into a detailed playbook for social engineering operations (source: LinkedIn/David Baek). Every name, title, department, and project mention published online is a data point that can be weaponized.
      </p>
    </div>

    <div class="accent-line" aria-hidden="true"></div>

    <!-- Source References (DoFollow) -->
    <div class="ref-links">
      <a href="https://attack.mitre.org/techniques/T1589/003" rel="dofollow noopener" target="_blank">MITRE ATT&amp;CK T1589.003</a>
      <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing-and-ransomware" rel="dofollow noopener" target="_blank">CISA, Malware, Phishing &amp; Ransomware</a>
      <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/business-email-compromise" rel="dofollow noopener" target="_blank">FBI, Business Email Compromise</a>
      <a href="https://www.sans.org/blog/identity-based-attacks-evolution-social-engineering-zero-trust-attack-vectors" rel="dofollow noopener" target="_blank">SANS, Identity-Based Attacks</a>
      <a href="https://www.cisa.gov/sites/default/files/2024-10/CISA-OCE%20Cost%20of%20Cyber%20Incidents%20Study_508.pdf" rel="dofollow noopener" target="_blank">CISA Cost of Cyber Incidents Study (PDF)</a>
    </div>
  </div>
</section>

<!-- ======== SECTION 3: KEY TERMS &amp; CONCEPTS ======== -->
<section id="concepts" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 03</div>
      <h2>Key Terms &amp; Concepts</h2>
      <div class="divider"></div>
    </div>

    <div class="def-box">
      <div class="def-label">Simple Definition</div>
      <p>
        <strong class="text-purple">Employee Names (T1589.003)</strong> is a sub-technique under MITRE ATT&amp;CK's T1589, Gather Victim Identity Information, where adversaries systematically collect the names of individuals working at a target organization. Names are harvested from a wide range of publicly accessible sources: <strong class="text-cyan">LinkedIn profiles</strong> (the single richest source of professional identity data), <strong class="text-cyan">corporate "About Us" and "Our Team" web pages</strong>, <strong class="text-cyan">conference speaker lists</strong>, <strong class="text-cyan">press releases</strong>, <strong class="text-cyan">SEC filings</strong> (which name executives and board members), <strong class="text-cyan">job postings</strong> (which reveal hiring managers and team structures), and <strong class="text-cyan">social media platforms</strong> like Twitter/X, Facebook, and GitHub. Once obtained, these names serve multiple attack purposes: they are used to <strong class="text-red">derive email addresses</strong> (using common naming conventions like firstname.lastname@company.com), <strong class="text-red">craft personalized phishing lures</strong> that reference the recipient by name and role, <strong class="text-red">impersonate executives in Business Email Compromise (BEC) attacks</strong> where the attacker poses as a C-suite leader to authorize fraudulent wire transfers, and <strong class="text-red">build detailed pretext scenarios</strong> for social engineering operations such as vishing (voice phishing) and in-person impersonation. Knowing specific names and roles makes attacks dramatically more convincing and significantly harder for victims and defenders to detect, because the communication appears to come from a legitimate, recognized source.
      </p>
    </div>

    <div class="analogy-box">
      <div class="def-label">Everyday Analogy</div>
      <p>
        Imagine a pickpocket who studies a hotel's guest list before arriving. They learn the names of the general manager, the head of security, the front desk supervisor, and several prominent guests. They note which guests arrived for the annual shareholders' conference, which executive is hosting a private dinner, and which manager recently received a promotion. When they walk into the lobby, they can greet people by name, reference colleagues and events, complain about the "usual" slow elevator service, and blend in perfectly, all because they did their homework. No one questions them because they seem to belong. The security guard doesn't ask for ID because "everyone knows" that person is a conference attendee. The front desk doesn't verify credentials because the visitor drops the CEO's name casually. <strong class="text-green">That's exactly what attackers do with employee names</strong>, they learn who's who, who reports to whom, and what projects are underway so they can walk into your digital organization, speak the language, reference the right people, and look like they belong. The difference is that a hotel pickpocket can only steal one wallet at a time, while a cyberattacker armed with employee names can compromise an entire organization in minutes.
      </p>
    </div>

    <div class="accent-line" aria-hidden="true"></div>

    <!-- Key Source Icons -->
    <div class="icon-grid">
      <div class="icon-card">
        <div class="ic-icon">&#128101;</div>
        <div class="ic-label">LinkedIn</div>
        <div class="ic-sub">Primary OSINT source</div>
      </div>
      <div class="icon-card">
        <div class="ic-icon">&#127760;</div>
        <div class="ic-label">Corporate Websites</div>
        <div class="ic-sub">Team pages, press releases</div>
      </div>
      <div class="icon-card">
        <div class="ic-icon">&#128240;</div>
        <div class="ic-label">SEC Filings</div>
        <div class="ic-sub">Executive disclosures</div>
      </div>
      <div class="icon-card">
        <div class="ic-icon">&#128197;</div>
        <div class="ic-label">Conference Lists</div>
        <div class="ic-sub">Speaker + attendee names</div>
      </div>
      <div class="icon-card">
        <div class="ic-icon">&#128229;</div>
        <div class="ic-label">Job Postings</div>
        <div class="ic-sub">Hiring managers, team info</div>
      </div>
      <div class="icon-card">
        <div class="ic-icon">&#128172;</div>
        <div class="ic-label">Social Media</div>
        <div class="ic-sub">Twitter/X, Facebook, GitHub</div>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 4: REAL-WORLD SCENARIO ======== -->
<section id="scenario" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 04</div>
      <h2>Real-World Scenario: The Tom Nakamura Incident</h2>
      <div class="divider"></div>
    </div>

    <div class="glow-card">
      <div style="align-items:center;gap:.8rem;margin-bottom:1.2rem;flex-wrap:wrap">
        <span class="threat-badge high">&#9888; HIGH SEVERITY</span>
        <span class="tactic-badge">T1589.003 + T1598.002, Spear Phishing + Vishing</span>
      </div>
      <h3 style="color:#e8ecf1;margin-bottom:.4rem">Target: Atlas Logistics, Global Shipping Company</h3>
      <p style="color:#5a7a8a;font-size:.88rem">
        <strong style="color:#8b5cf6">Victim:</strong> Tom Nakamura, Head of Human Resources<br>
        <strong style="color:#8b5cf6">Company:</strong> Atlas Logistics, 3,000 employees across 14 countries<br>
        <strong style="color:#8b5cf6">Industry:</strong> Global shipping &amp; supply chain management
      </p>
    </div>

    <div class="scenario-timeline">

      <!-- Before -->
      <div class="timeline-item bad">
        <h4>&#10060; Before: Exposed Employee Data Enables Devastating Attack</h4>
        <p>
          Atlas Logistics had published detailed employee names and titles on their corporate website's "Our Team" page, organized by department and regional office. LinkedIn showed <strong class="text-cyan">2,800 employee profiles</strong> with granular job descriptions, reporting structures, tenure dates, and professional connections. Press releases routinely named key executives and their roles in new contracts, partnerships, and expansion initiatives. Job postings revealed team structures and named hiring managers.
        </p>
		<br>
        <p>
          A sophisticated attack group (tracked as APT-SCORPION) scraped this publicly available data over a <strong class="text-red">two-month reconnaissance period</strong> using automated tools. They built a complete organizational chart, from the CEO down to regional warehouse supervisors, mapping reporting relationships, recent promotions, project assignments, and even internal reorganizations visible through LinkedIn activity patterns. They identified Tom Nakamura as a high-value target: as Head of HR, he had broad system access, authority over employee onboarding processes, and a trusting relationship with the IT department.
        </p>
		<br>
        <p>
          The attackers impersonated Tom himself in a <strong class="text-red">vishing (voice phishing) attack</strong>. They called the IT helpdesk, spoke confidently, cited specific team members by name (Sarah in Payroll, David in IT Infrastructure, and Jennifer who had just been promoted), referenced a recent company-wide software migration project, and convinced a technician that Tom was locked out of his account during an urgent off-hours emergency. The technician, recognizing "Tom's voice" and the accurate internal details, reset a privileged Active Directory account password.
        </p>
		<br>
        <p>
          Within <strong class="text-red">24 hours</strong>, the attackers had accessed the shipping management system, rerouted 12 containers worth <strong class="text-red">$8.5 million</strong>, and exfiltrated the employee database containing sensitive personal information of all 3,000 staff members. The breach was discovered only when a port authority in Rotterdam flagged a container that didn't match the declared manifest.
        </p>
      </div>

      <!-- After -->
      <div class="timeline-item good">
        <h4>&#10003; After: Comprehensive Name Exposure Reduction Strategy</h4>
        <p>
          After the devastating breach, Tom Nakamura led a fundamental overhaul of Atlas Logistics' information exposure policies. He implemented a <strong class="text-green">name exposure reduction policy</strong> that removed all individual employee pages from the corporate website, replacing them with department-level descriptions and generic role titles. He provided <strong class="text-green">LinkedIn privacy training</strong> to all employees, teaching them to limit profile visibility, disable connection browsing, and remove sensitive details like direct phone numbers and project assignments.
        </p>
		<br>
        <p>
          The company replaced all named contact points with <strong class="text-green">department-level email aliases</strong> (e.g., "hr@atlas.com" instead of "tom.nakamura@atlas.com", "it-support@atlas.com" instead of "david.okonkwo@atlas.com"). This simple change eliminated the attacker's ability to derive individual email addresses for spear phishing and made BEC impersonation significantly harder. Tom also established <strong class="text-green">callback verification procedures</strong> for all IT requests involving password resets, account changes, or privileged access, requiring technicians to call back the requester using a number on file, not a number provided during the call.
        </p>
		<br>
        <p>
          Atlas deployed <strong class="text-green">voice authentication</strong> for high-privilege password resets and sensitive operations, using voice biometrics to verify caller identity before making any changes. They instituted <strong class="text-green">quarterly social engineering penetration tests</strong> to continuously measure improvement and identify residual exposure. Within one year, the company's social engineering susceptibility rate dropped from 34% to under 8%, and their employee name exposure footprint on search engines decreased by 92%.
        </p>
      </div>

    </div>

    <!-- Phishing Email Example -->
    <div class="phish-email">
      <div class="phish-header">
        <span class="phish-from">From: marcus.webb@atlas-logistics.com <span class="threat-badge high" style="font-size:.45rem;padding:.1rem .3rem">SPOOFED</span></span>
        <span class="phish-to">To: sarah.chen@atlas-logistics.com</span>
      </div>
      <div class="phish-subject">Subject: URGENT, ACME Vendor Payment Authorization Needed Today</div>
      <div class="phish-body">
        Sarah,<br><br>
        I'm in back-to-back meetings and can't reach David. Can you authorize the <span class="highlight">ACME Logistics Q4 payment ($47,200)</span> before 5pm today? Our account manager said the invoice is past due and they'll halt shipments tomorrow.<br><br>
        Wire details attached. Please confirm once done.<br><br>
        <strong>Marcus Webb</strong><br>
        CEO, Atlas Logistics
        <span class="phish-warning">&#9888; This email was crafted using publicly known names, titles, and organizational relationships scraped from LinkedIn and the Atlas website.</span>
      </div>
    </div>

  </div>
</section>

<!-- ======== SECTION 5: STEP-BY-STEP GUIDE ======== -->
<section id="guide" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 05</div>
      <h2>Step-by-Step Guide: Protecting Employee Name Data</h2>
      <div class="divider"></div>
    </div>

    <div class="steps-grid">

      <div class="step-card">
        <div class="step-num">01</div>
        <div class="step-content">
          <h4>Audit Employee Name Exposure Online</h4>
          <p>Conduct a thorough audit of all publicly accessible sources where employee names appear. Search Google, Bing, LinkedIn, social media platforms, conference websites, press release archives, SEC filings, job boards, and industry directories for your organization's employee names. Document every instance with the source URL, the employee name and title listed, and the sensitivity of the information revealed (e.g., reporting relationships, project involvement, contact details). This audit forms the baseline for measuring improvement.</p>
          <ul>
            <li>Use Google dorking: site:linkedin.com "Your Company" + job titles</li>
            <li>Search the Wayback Machine for archived team pages</li>
            <li>Check GitHub, GitLab, and Stack Overflow for employee accounts</li>
            <li>Review job postings for named hiring managers and team details</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">02</div>
        <div class="step-content">
          <h4>Implement Social Media Guidelines and Training</h4>
          <p>Develop and enforce a comprehensive social media policy that educates employees about the risks of oversharing professional information online. Training should cover LinkedIn privacy settings (restricting profile visibility to connections only, disabling "people also viewed"), the dangers of posting about specific projects, clients, or internal tools, and the risks of accepting connection requests from unknown profiles that may be adversary-controlled reconnaissance accounts. Make this training mandatory and annual.</p>
          <ul>
            <li>Require employees to review LinkedIn privacy settings quarterly</li>
            <li>Prohibit sharing internal org charts or reporting structures online</li>
            <li>Train employees to recognize fake connection requests from OSINT collectors</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">03</div>
        <div class="step-content">
          <h4>Replace Individual Contacts with Role-Based Aliases</h4>
          <p>Eliminate named individual contact points on your public-facing website, email signatures, business cards, and external communications. Replace all individual email addresses with department-level aliases (e.g., "security@company.com" instead of "john.smith@company.com", "hr@company.com" instead of "jane.doe@company.com"). This single change dramatically reduces the attacker's ability to derive email addresses for spear phishing and makes it significantly harder to impersonate specific individuals in BEC attacks, because the target can't be addressed by their personal email.</p>
          <ul>
            <li>Create role-based aliases for every externally-facing department</li>
            <li>Route role-based aliases through ticketing systems for accountability</li>
            <li>Update all marketing materials, directories, and partner communications</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">04</div>
        <div class="step-content">
          <h4>Restrict Public Organizational Charts</h4>
          <p>Remove detailed organizational charts from your corporate website, investor presentations, and publicly accessible documents. If organizational structure information must be shared (e.g., for investor relations), use generic role titles rather than named individuals, and restrict access behind authentication. Internal organizational charts should be classified as sensitive information and shared only on a need-to-know basis. Lobby against the publication of named executive profiles in press materials, annual reports, and third-party directories.</p>
          <ul>
            <li>Replace "Meet Our Team" pages with department-level descriptions only</li>
            <li>Review all SEC filings, annual reports, and investor decks for named employees</li>
            <li>Request removal from third-party business directories and rating sites</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">05</div>
        <div class="step-content">
          <h4>Implement Verification Procedures for Sensitive Requests</h4>
          <p>Establish and enforce strict verification procedures for any request that could lead to sensitive actions, password resets, account changes, wire transfers, data access grants, or configuration changes. Never rely solely on the caller's claimed identity or knowledge of employee names as verification. Implement callback procedures using phone numbers stored in your internal directory (not numbers provided by the caller), require multi-factor authentication for password resets, and create escalation paths for unusual or urgent requests that bypass normal processes.</p>
          <ul>
            <li>Always callback using a known, stored number, never caller-provided</li>
            <li>Require MFA for all privileged account password resets</li>
            <li>Create an "urgent request" protocol that adds extra verification steps</li>
            <li>Train IT helpdesk and finance staff specifically on social engineering tactics</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">06</div>
        <div class="step-content">
          <h4>Conduct Regular Social Engineering Assessments</h4>
          <p>Run quarterly social engineering penetration tests that specifically test your organization's resilience to attacks leveraging employee name information. These assessments should include simulated spear phishing emails (crafted using OSINT-gathered names and roles), vishing calls targeting the IT helpdesk and finance department, and pretexting scenarios that test whether employees verify the identity of callers claiming to be executives or trusted partners. Track metrics over time (click rates, information disclosure rates, successful impersonation rates) to measure improvement and identify training gaps.</p>
          <ul>
            <li>Use realistic phishing lures based on your actual OSINT exposure</li>
            <li>Include vishing and smishing (SMS phishing) in your test scenarios</li>
            <li>Report results to leadership with trend data showing improvement</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">07</div>
        <div class="step-content">
          <h4>Deploy Voice Authentication and Callback Procedures</h4>
          <p>Implement voice biometric authentication for high-privilege operations, particularly password resets, account changes, and financial transaction authorizations conducted over the phone. Voice authentication adds a biometric layer that is extremely difficult for attackers to bypass, even when they have the target's name and role information. Combine voice authentication with mandatory callback procedures using pre-registered phone numbers, and implement time delays for high-value transactions to allow additional verification. Train employees to expect and welcome these verification steps rather than viewing them as obstacles.</p>
          <ul>
            <li>Deploy voice biometrics for IT helpdesk and finance department calls</li>
            <li>Implement 24-hour cooling-off periods for wire transfers above thresholds</li>
            <li>Create a "safe word" system for executive-to-executive urgent requests</li>
            <li>Log and audit all privileged account changes for forensic analysis</li>
          </ul>
        </div>
      </div>

    </div>
  </div>
</section>

<!-- ======== SECTION 6: COMMON MISTAKES &amp; BEST PRACTICES ======== -->
<section id="mistakes" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 06</div>
      <h2>Common Mistakes &amp; Best Practices</h2>
      <div class="divider"></div>
    </div>

    <div class="mb-grid">
      <!-- Mistakes -->
      <div class="glass-card mb-card mistake">
        <h3>&#10060; Common Mistakes</h3>
        <ul>
          <li><strong>Publishing detailed "Meet the Team" pages</strong> with full names, photos, titles, departments, and direct contact information on the corporate website, providing adversaries with a ready-made target list complete with everything needed to craft convincing impersonations.</li>
          <li><strong>Allowing employees to list their work email addresses publicly on LinkedIn</strong> or other social media platforms, giving attackers confirmed email addresses that can be used immediately for spear phishing without any guesswork or derivation effort.</li>
          <li><strong>Using predictable email naming conventions</strong> (like firstname.lastname@company.com) across the entire organization without implementing any rate limiting or email enumeration protections, making it trivial for attackers to derive every employee's email address once they know a single pattern.</li>
          <li><strong>Neglecting to train employees on social engineering awareness</strong>, assuming that technical controls like spam filters are sufficient protection, when in reality the most effective BEC and spear phishing attacks bypass technical defenses entirely by leveraging personal details that only proper training can help employees recognize as suspicious.</li>
          <li><strong>Trusting caller ID and email display names as identity verification</strong>, both are trivially spoofed, yet many helpdesks and executive assistants still treat a caller who "is" the CFO as verified simply because the caller ID matches, without performing any independent callback or authentication.</li>
        </ul>
      </div>

      <!-- Best Practices -->
      <div class="glass-card mb-card best">
        <h3>&#10003; Best Practices</h3>
        <ul>
          <li><strong>Implement role-based email aliases for all external communications</strong>, use department-level addresses (security@, hr@, info@) for all public-facing contact points, and keep individual employee email addresses strictly internal to prevent enumeration and targeted phishing.</li>
          <li><strong>Conduct quarterly OSINT audits of your organization's public exposure</strong>, systematically search LinkedIn, Google, social media, job boards, and archived websites to discover what employee names and details are publicly accessible, then work to remove or reduce the most sensitive exposures.</li>
          <li><strong>Deploy mandatory annual social engineering awareness training</strong> that uses realistic simulations based on your actual organizational structure and employee data, including simulated BEC emails, vishing calls, and pretexting scenarios that reference real names, projects, and relationships.</li>
          <li><strong>Implement callback verification with stored numbers for all sensitive requests</strong>, never trust caller-provided contact information, always callback using numbers from your internal directory, and require multiple verification factors before performing password resets, account changes, or financial transactions.</li>
          <li><strong>Deploy voice biometric authentication for high-privilege operations</strong>, voice authentication adds a biometric verification layer that cannot be bypassed with stolen names or spoofed caller ID, providing strong protection against vishing attacks targeting privileged account management.</li>
        </ul>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 7: RED TEAM vs BLUE TEAM ======== -->
<section id="teams" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 07</div>
      <h2>Red Team vs. Blue Team Perspective</h2>
      <div class="divider"></div>
    </div>

    <div class="team-grid">

      <!-- Red Team -->
      <div class="glass-card team-card red">
        <span class="team-label">RED TEAM</span>
        <h3>&#9760; Attacker View: How to Exploit Employee Names</h3>
        <p>
          From the adversary's perspective, employee names are the <strong>lowest-cost, highest-return</strong> intelligence available during the reconnaissance phase. They are freely available, rarely protected, and instantly weaponizable. The red team approach begins with broad OSINT collection: scraping LinkedIn for every employee profile associated with the target domain, using Google dorking to find named individuals in press releases, conference programs, and court filings, and harvesting social media posts that reveal internal relationships, project names, and organizational changes.
        </p>
		<br>
        <p>
          Once a comprehensive name database is built, the red team uses it to <strong>derive email addresses</strong> using common corporate naming conventions (firstname.lastname@, flast@, firstinitiallastname@), then <strong>validates these addresses</strong> using tools that check for SMTP responses. Validated emails become targets for <strong>spear phishing campaigns</strong> personalized with the recipient's name, title, department, and known projects. For BEC attacks, the red team identifies C-suite executives and finance staff, studies their communication patterns and relationships, and crafts emails that impersonate these individuals in time-sensitive authorization requests.
        </p>
		<br>
        <p>
          For <strong>vishing operations</strong>, employee names enable pretext building: the attacker calls a helpdesk or executive assistant, claims to be a named employee (whose voice they may clone using AI deepfake technology), and references specific colleagues and projects to establish credibility. The more names the attacker knows, the more convincing the impersonation becomes. <strong>Names are not just data points, they are keys that unlock trust, and trust is the ultimate vulnerability.</strong>
        </p>
        <div style="margin-top:1rem">
          <span class="tool-tag">theHarvester</span>
          <span class="tool-tag">Maltego</span>
          <span class="tool-tag">LinkedIn Scraper</span>
          <span class="tool-tag">SpiderFoot</span>
          <span class="tool-tag">Shodan</span>
          <span class="tool-tag">GHunt</span>
        </div>
      </div>

      <!-- Blue Team -->
      <div class="glass-card team-card blue">
        <span class="team-label">BLUE TEAM</span>
        <h3>&#128737; Defender View: How to Detect &amp; Prevent</h3>
        <p>
          For defenders, the challenge is that employee name collection happens entirely <strong>outside your perimeter</strong>, you cannot detect or block an attacker browsing your public LinkedIn profiles or reading your press releases. Defense therefore focuses on <strong>reducing the available attack surface</strong> (minimizing what information is publicly accessible) and <strong>hardening the human layer</strong> (training employees to recognize social engineering attempts that leverage name-based personalization).
        </p>
		<br>
        <p>
          Blue team countermeasures include: <strong>OSINT monitoring programs</strong> that regularly audit what employee information is publicly exposed; <strong>role-based email aliasing</strong> that prevents individual email enumeration; <strong>enhanced email authentication</strong> (DMARC, DKIM, SPF) that makes it harder for attackers to spoof your domains; <strong>callback verification procedures</strong> for sensitive operations; and <strong>behavioral analytics</strong> that detect unusual access patterns, such as a helpdesk technician receiving multiple calls requesting password resets in a short period, or an executive's email being used to send unusually urgent financial authorization requests from an atypical location.
        </p>
		<br>
        <p>
          <strong>Continuous social engineering testing</strong> is essential, not one-time assessments, but ongoing programs that adapt to your evolving exposure. Track metrics like phishing click rates, vishing success rates, and time-to-report, and use them to focus training investments. Implement <strong>voice biometrics for phone-based authentication</strong> and <strong>hard breaks</strong> in financial transaction workflows that require independent verification regardless of the perceived urgency. The goal is not to eliminate employee names from the internet (which is impossible) but to make it so that knowing a name is never sufficient to compromise your organization.
        </p>
        <div style="margin-top:1rem">
          <span class="tool-tag">DMARC Analyzer</span>
          <span class="tool-tag">KnowBe4</span>
          <span class="tool-tag">Proofpoint TAP</span>
          <span class="tool-tag">Microsoft Defender</span>
          <span class="tool-tag">Abnormal Security</span>
          <span class="tool-tag">Voice Biometrics</span>
        </div>
      </div>

    </div>
  </div>
</section>

<!-- ======== SECTION 8: THREAT HUNTER'S EYE ======== -->
<section id="hunter" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 08</div>
      <h2>Threat Hunter's Eye: Detection Opportunities</h2>
      <div class="divider"></div>
    </div>

    <div class="hunter-card">
      <h3>&#128270; What Threat Hunters Should Look For</h3>
      <p>
        While the actual collection of employee names (T1589.003) occurs outside your network and cannot be directly detected, threat hunters can identify the <strong class="text-purple">downstream effects</strong> of name-based reconnaissance by monitoring for patterns that indicate an adversary is using harvested employee data in active operations. Here are the key detection signals and hunting hypotheses:
      </p>

      <div class="accent-line" aria-hidden="true"></div>

      <table class="data-table">
        <thead>
          <tr>
            <th>Detection Signal</th>
            <th>What to Monitor</th>
            <th>Tool / Data Source</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td class="text-purple">Email enumeration probes</td>
            <td>Rapid RCPT TO commands or SMTP VRFY probes targeting derived email addresses (firstname.lastname@, flast@, etc.)</td>
            <td>Mail server logs, SMTP gateway</td>
          </tr>
          <tr>
            <td class="text-cyan">Spear phishing with name personalization</td>
            <td>Incoming emails that correctly reference internal employee names, titles, or projects not available to external parties</td>
            <td>Email gateway, SIEM, SOC reports</td>
          </tr>
          <tr>
            <td class="text-green">BEC impersonation patterns</td>
            <td>Emails from lookalike domains that spoof executive names, with urgent language requesting wire transfers or credential changes</td>
            <td>DMARC reports, email security platform</td>
          </tr>
          <tr>
            <td class="text-red">Helpdesk social engineering attempts</td>
            <td>Multiple password reset requests in short windows, callers referencing specific employee names to gain trust</td>
            <td>Service desk ticketing system, call logs</td>
          </tr>
          <tr>
            <td class="text-purple">LinkedIn profile scraping traffic</td>
            <td>Unusual traffic patterns to LinkedIn from company IP ranges or VPN endpoints (indicating insider reconnaissance)</td>
            <td>Proxy/web filter logs, DNS logs</td>
          </tr>
          <tr>
            <td class="text-cyan">Account takeover correlation</td>
            <td>Compromised employee accounts used to access HR databases, org charts, or contact lists (post-exploitation enumeration)</td>
            <td>UEBA, IAM logs, Cloud SIEM</td>
          </tr>
        </tbody>
      </table>

      <div class="accent-line" aria-hidden="true"></div>

      <h3 style="margin-top:1rem">&#128218; Hunting Hypotheses</h3>
      <div style="flex-direction:column;gap:.8rem;margin-top:1rem">
        <div class="glass-card" style="padding:1rem 1.2rem;margin-bottom:0">
          <p style="font-size:.85rem"><strong class="text-purple">Hypothesis 1:</strong> If an adversary has harvested our employee email addresses, we should see an increase in targeted phishing emails that use first-name-only greetings (e.g., "Hi Sarah" instead of "Dear User") and reference our actual department names and project codenames.</p>
        </div>
        <div class="glass-card" style="padding:1rem 1.2rem;margin-bottom:0">
          <p style="font-size:.85rem"><strong class="text-cyan">Hypothesis 2:</strong> If attackers are using our organizational chart for BEC, we should detect email spoofing attempts that impersonate executives by name, originating from domains that are character-level variations of our actual domain.</p>
        </div>
        <div class="glass-card" style="padding:1rem 1.2rem;margin-bottom:0">
          <p style="font-size:.85rem"><strong class="text-green">Hypothesis 3:</strong> If vishing attacks are leveraging employee name data, our helpdesk should experience an uptick in callers who accurately name specific employees when requesting password resets or access changes.</p>
        </div>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 9: CALL-TO-ACTION ======== -->
<section id="cta" class="section">
  <div class="container">
    <div class="cta-section">
      <div class="cta-box">
        <div class="section-tag" style="margin-bottom:.5rem">// Continue Exploring</div>
        <h2 style="background:linear-gradient(90deg,#8b5cf6,#00f0ff)">Related Techniques in Identity Reconnaissance</h2>
        <p>Employee Names (T1589.003) is one of three sub-techniques under Gather Victim Identity Information. Explore the full attack surface of identity-based reconnaissance:</p>

        <div class="subtech-links">
          <a href="T1589_Gather_Victim_Identity_Information.html">
            &#9654; T1589, Gather Victim Identity Information
          </a>
          <a href="T1589.001_Credentials.html">
            &#9654; T1589.001, Credentials
          </a>
          <a href="T1589.002_Email_Addresses.html">
            &#9654; T1589.002, Email Addresses
          </a>
        </div>

        <div class="accent-line" aria-hidden="true" style="margin-top:2rem"></div>

        <p style="font-size:.82rem;color:#5a7a8a;margin-top:1rem">
          <strong class="text-purple">Remember:</strong> Every employee name published online is a potential key to your organization. Audit your exposure, train your people, and verify everything. The human layer is both the most targeted and the most defendable, if you invest in it.
        </p>
      </div>
    </div>
  </div>
</section>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-9e57aeb e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="9e57aeb" data-element_type="container">
				<div class="elementor-element elementor-element-a22cd35 elementor-widget elementor-widget-html" data-id="a22cd35" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					
    <div class="attack-card">
        <!-- header with main technique context -->
        <div class="technique-header" style="text-align: center">
            <h2><i class="fas fa-radar" style="font-size: 1.2rem;margin-right: 8px;color: #2de0c0"></i>Employee Names</h2>
        </div>
        <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 10px 0">

        <!-- MITIGATIONS section (pre-compromise) -->
        <div style="margin-bottom: 1.5rem">
            <div class="section-title">
                <i class="fas fa-shield-virus"></i> MITIGATIONS
            </div>
            <div class="mitigation-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Pre-compromise</span>
                    <span class="small-tag" style="text-align: center">M1056</span>
                </a>
            </div>
        </div>

        <!-- DETECTION section -->
        <div style="margin-bottom: 1rem">
            <div class="section-title">
                <i class="fas fa-eye"></i> DETECTION STRATEGY
            </div>
            <div class="detection-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Detection of Hardware</span>
                    <span class="small-tag" style="text-align: center">DET0887</span>
                </a>
            </div>
        </div>
    </div>
    
        <!-- ========== END OF PAGE – DONATION BOX : BRIEF, DIRECT, HONEST ========== -->
    <div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
		<div data-wpr-particles="{&quot;particles&quot;:{&quot;number&quot;:{&quot;value&quot;:400,&quot;density&quot;:{&quot;enable&quot;:true,&quot;value_area&quot;:800}},&quot;color&quot;:{&quot;value&quot;:&quot;#000000&quot;},&quot;shape&quot;:{&quot;type&quot;:&quot;circle&quot;,&quot;stroke&quot;:{&quot;width&quot;:0,&quot;color&quot;:&quot;#000000&quot;},&quot;polygon&quot;:{&quot;nb_sides&quot;:5},&quot;image&quot;:{&quot;src&quot;:&quot;img/github.svg&quot;,&quot;width&quot;:100,&quot;height&quot;:100}},&quot;opacity&quot;:{&quot;value&quot;:0.5,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:1,&quot;opacity_min&quot;:0.1,&quot;sync&quot;:false}},&quot;size&quot;:{&quot;value&quot;:10,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:40,&quot;size_min&quot;:0.1,&quot;sync&quot;:false}},&quot;line_linked&quot;:{&quot;enable&quot;:false,&quot;distance&quot;:500,&quot;color&quot;:&quot;#000000&quot;,&quot;opacity&quot;:0.4,&quot;width&quot;:2},&quot;move&quot;:{&quot;enable&quot;:true,&quot;speed&quot;:6,&quot;direction&quot;:&quot;bottom&quot;,&quot;random&quot;:false,&quot;straight&quot;:false,&quot;out_mode&quot;:&quot;out&quot;,&quot;bounce&quot;:false,&quot;attract&quot;:{&quot;enable&quot;:false,&quot;rotateX&quot;:600,&quot;rotateY&quot;:1200}}},&quot;interactivity&quot;:{&quot;detect_on&quot;:&quot;window&quot;,&quot;events&quot;:{&quot;onhover&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;bubble&quot;},&quot;onclick&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;repulse&quot;},&quot;resize&quot;:true},&quot;modes&quot;:{&quot;grab&quot;:{&quot;distance&quot;:400,&quot;line_linked&quot;:{&quot;opacity&quot;:0.5}},&quot;bubble&quot;:{&quot;distance&quot;:400,&quot;size&quot;:4,&quot;duration&quot;:0.3,&quot;opacity&quot;:1,&quot;speed&quot;:3},&quot;repulse&quot;:{&quot;distance&quot;:200,&quot;duration&quot;:0.4},&quot;push&quot;:{&quot;particles_nb&quot;:4},&quot;remove&quot;:{&quot;particles_nb&quot;:2}}},&quot;retina_detect&quot;:true}" particle-source="wpr_particle_json" wpr-quantity="100" wpr-color="#FFFFFF" wpr-speed="3" wpr-shape="circle" wpr-size="4" class="elementor-element elementor-element-5dcf1b0 e-con-full wpr-particle-yes e-flex wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="5dcf1b0" data-element_type="container">
				<div class="elementor-element elementor-element-d44a63c elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="d44a63c" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-0728e65 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="0728e65" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-3ce780c wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info" data-id="3ce780c" data-element_type="widget" data-widget_type="wpr-post-info.default">
				<div class="elementor-widget-container">
					<ul class="wpr-post-info wpr-post-info-horizontal"><li class="wpr-post-info-author"><span class="wpr-post-info-text"><i aria-hidden="true" class="far fa-copyright"></i></span><span>Cyber Pulse Academy</span></li><li class="wpr-post-info-date"><span>February 13, 2026</span></li><li class="wpr-post-info-comments"></li></ul>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-cfafe83 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="cfafe83" data-element_type="container">
					<div class="e-con-inner">
					</div>
				</div>
		<div class="elementor-element elementor-element-c89818d e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="c89818d" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0e5e15d wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="0e5e15d" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Email Addresses &#8211; T1589.002</title>
		<link>https://www.cyberpulseacademy.com/email-addresses-t1589-002/</link>
					<comments>https://www.cyberpulseacademy.com/email-addresses-t1589-002/#respond</comments>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 03:16:48 +0000</pubDate>
				<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[Reconnaissance]]></category>
		<category><![CDATA[T1589]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=12568</guid>

					<description><![CDATA[Email Addresses MITIGATIONS Pre-compromise M1056 DETECTION STRATEGY Detection of Hardware DET0887 DONATE · SUPPORT We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution &#8211; no matter the size &#8211; makes this platform sustainable. 100% of your support goes to the platform. No corporate sponsors, just the community. ROOT::DONATE Donate Now Cyber Pulse Academy February 13, 2026]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="12568" class="elementor elementor-12568" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-fe7c628 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="fe7c628" data-element_type="container">
		<div class="elementor-element elementor-element-df92deb e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="df92deb" data-element_type="container">
				<div class="elementor-element elementor-element-a25131c elementor-widget elementor-widget-template" data-id="a25131c" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="12461" class="elementor elementor-12461" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-aaf024e e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="aaf024e" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-82d6f37 elementor-widget elementor-widget-html" data-id="82d6f37" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<!-- ═══════════════════════════════════════════
     1. HERO / SIMULATION SECTION
     ═══════════════════════════════════════════ -->
<section class="section hero" id="hero">
  <div class="container">
    <div class="hero-content">
      <div class="hero-text">
        <div class="tag">&#9888; ATT&amp;CK T1589.002 ,  Initial Access Precursor</div>
        <h1>
          <span class="line1">Gather Victim Identity:</span>
          <span class="line2">Email Addresses</span>
          <span class="line3">The Gateway to Every Phishing Attack</span>
        </h1>
        <p class="hero-desc">
          Adversaries systematically harvest email addresses from corporate websites, LinkedIn profiles, WHOIS records, and data breaches to build target lists for phishing, BEC, and spear-phishing campaigns. This is the reconnaissance step that precedes some of the most financially devastating cyberattacks in history ,  turning publicly available information into weapons of social engineering.
        </p>
        <div class="hero-badges">
          <span class="badge badge-purple">Tactic: Reconnaissance</span>
          <span class="badge badge-orange">Sub-technique: T1589.002</span>
          <span class="badge badge-cyan">Platform: Enterprise</span>
          <span class="badge badge-red">Risk: Critical</span>
        </div>
      </div>

      <div class="hero-visual">
        <!-- Email Inbox Mockup -->
        <div class="inbox-mockup">
          <div class="inbox-header">
            <div class="dots"><span></span><span></span><span></span></div>
            <div class="title">&#9993; victim-inbox@meridianmfg.com</div>
            <div class="count">7 UNREAD</div>
          </div>
          <div class="inbox-body">
            <div class="email-row legitimate">
              <div class="email-icon safe">&#9993;</div>
              <div class="email-meta">
                <div class="email-sender">IT Support &lt;it@meridianmfg.com&gt;</div>
                <div class="email-subject">Scheduled maintenance window ,  Saturday 2AM EST</div>
              </div>
              <div class="email-time">9:12 AM</div>
            </div>
            <div class="email-row phishing">
              <div class="email-icon warn">&#9993;</div>
              <div class="email-meta">
                <div class="email-sender">CEO Office &lt;ceo-office@meridianmfg.com&gt;</div>
                <div class="email-subject">URGENT: Confidential wire transfer ,  respond immediately</div>
              </div>
              <div class="email-time">9:47 AM</div>
            </div>
            <div class="email-row legitimate">
              <div class="email-icon safe">&#9993;</div>
              <div class="email-meta">
                <div class="email-sender">HR Department &lt;hr@meridianmfg.com&gt;</div>
                <div class="email-subject">Q4 benefits enrollment now open</div>
              </div>
              <div class="email-time">10:03 AM</div>
            </div>
            <div class="email-row danger">
              <div class="email-icon bad">&#9993;</div>
              <div class="email-meta">
                <div class="email-sender">Angela Torres &lt;a.torres@meridianmfg.com&gt;</div>
                <div class="email-subject">Wire $1.8M to new vendor ,  Hong Kong account attached</div>
              </div>
              <div class="email-time">10:31 AM</div>
            </div>
            <div class="email-row phishing">
              <div class="email-icon warn">&#9993;</div>
              <div class="email-meta">
                <div class="email-sender">Microsoft 365 &lt;security@m1crosoft-verify.com&gt;</div>
                <div class="email-subject">Your password expires in 24 hours ,  click to update</div>
              </div>
              <div class="email-time">11:15 AM</div>
            </div>
          </div>
        </div>

        <!-- Email Harvesting Visualization -->
        <div class="harvest-section">
          <div class="harvest-grid">
            <div class="harvest-source glass">
              <span class="harvest-icon">&#127760;</span>
              <h4>Corporate Websites</h4>
              <p>Public contact pages, press releases, team directories listing employee emails</p>
            </div>
            <div class="harvest-source glass glass-cyan">
              <span class="harvest-icon">&#128101;</span>
              <h4>LinkedIn / Social Media</h4>
              <p>Employee profiles with company email patterns, job titles, department info</p>
            </div>
            <div class="harvest-source glass glass-orange">
              <span class="harvest-icon">&#128269;</span>
              <h4>WHOIS / Data Breaches</h4>
              <p>Domain registration contacts, leaked credentials, third-party databases</p>
            </div>
          </div>

          <!-- Envelope Flow Animation -->
          <div class="envelope-flow">
            <div class="glass" style="padding: 0.75rem 1rem;font-family: var(--font-mono);font-size: 0.72rem;color: var(--text-dim);text-align: center">
              &#128230; Data Sources
            </div>
            <div class="envelope-stream">
              <span class="envelope">&#9993;</span>
              <span class="envelope">&#9993;</span>
              <span class="envelope">&#9993;</span>
              <span class="envelope">&#9993;</span>
              <span class="envelope">&#9993;</span>
            </div>
            <div class="attacker-list">
              <h4>&#128274; Attacker's Harvested List</h4>
              <div class="email-entry">j.smith@meridianmfg.com</div>
              <div class="email-entry">a.torres@meridianmfg.com</div>
              <div class="email-entry">m.chen@meridianmfg.com</div>
              <div class="email-entry">r.patel@meridianmfg.com</div>
              <div class="email-entry">s.williams@meridianmfg.com</div>
              <div class="email-entry">k.johnson@meridianmfg.com</div>
            </div>
          </div>
        </div>

        <!-- BEC Attack Chain -->
        <div class="bec-chain glass glass-orange" style="margin-top: 1.5rem;padding: 1.5rem">
          <div class="bec-chain-title">&#9888; BEC Attack Chain Visualization</div>
          <div class="chain-steps">
            <div class="chain-connector"></div>
            <div class="chain-step">
              <div class="step-icon">&#128270;</div>
              <h4 style="color: var(--purple)">1. Reconnaissance</h4>
              <p>Harvest emails from website, LinkedIn, WHOIS</p>
            </div>
            <div class="chain-step">
              <div class="step-icon">&#9993;</div>
              <h4 style="color: var(--orange)">2. Spoofed Email</h4>
              <p>Impersonate VP of Finance with lookalike domain</p>
            </div>
            <div class="chain-step">
              <div class="step-icon">&#128176;</div>
              <h4 style="color: var(--yellow)">3. Wire Transfer</h4>
              <p>Urgent request to CFO for $1.8M payment</p>
            </div>
            <div class="chain-step">
              <div class="step-icon">&#128683;</div>
              <h4 style="color: var(--red)">4. Money Lost</h4>
              <p>Funds vanish to offshore shell company</p>
            </div>
          </div>
          <div class="chain-progress-bar">
            <div class="chain-progress-fill"></div>
          </div>
        </div>

        <!-- Email Derivation Visual -->
        <div class="email-derive-visual">
          <div style="font-family: var(--font-mono);font-size: 0.78rem;color: var(--cyan);margin-bottom: 0.75rem">&#9881; Email Address Derivation from Employee Names</div>
          <div class="derive-row">
            <span class="derive-label">John Smith</span>
            <span class="derive-arrow">&#10132;</span>
            <span class="derive-email">j.smith@company.com</span>
          </div>
          <div class="derive-row">
            <span class="derive-label">John Smith</span>
            <span class="derive-arrow">&#10132;</span>
            <span class="derive-email">john.smith@company.com</span>
          </div>
          <div class="derive-row">
            <span class="derive-label">John Smith</span>
            <span class="derive-arrow">&#10132;</span>
            <span class="derive-email">jsmith@company.com</span>
          </div>
          <div class="derive-row">
            <span class="derive-label">John Smith</span>
            <span class="derive-arrow">&#10132;</span>
            <span class="derive-email">johns@company.com</span>
          </div>
        </div>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     2. WHY IT MATTERS
     ═══════════════════════════════════════════ -->
<section class="section why-section" id="why">
  <div class="container">
    <div class="section-label">Section 02</div>
    <h2 class="section-title1">Why <span class="accent-orange">Email Addresses</span> Matter</h2>
    <p class="section-subtitle">
      Email addresses are the foundational reconnaissance artifact that enables the most costly cyberattacks worldwide. Understanding their role in the threat landscape is critical for every security professional.
    </p>

    <div class="stats-grid">
      <div class="stat-card glass">
        <div class="stat-value red">$55B</div>
        <div class="stat-label">Total BEC losses 2013–2023<br><span style="color: var(--text-dim);font-size: 0.68rem">Source: FBI IC3 PSA</span></div>
      </div>
      <div class="stat-card glass">
        <div class="stat-value orange">$16.6B</div>
        <div class="stat-label">2024 IC3 total cybercrime losses<br><span style="color: var(--text-dim);font-size: 0.68rem">Source: FBI IC3 / NACHA</span></div>
      </div>
      <div class="stat-card glass">
        <div class="stat-value purple">$8.5B</div>
        <div class="stat-label">BEC losses reported 2022–2024<br><span style="color: var(--text-dim);font-size: 0.68rem">Source: FBI IC3 / NACHA</span></div>
      </div>
      <div class="stat-card glass">
        <div class="stat-value cyan">193,407</div>
        <div class="stat-label">Phishing/spoofing incidents in 2024 (#1 crime)<br><span style="color: var(--text-dim);font-size: 0.68rem">Source: FBI IC3 / Proofpoint</span></div>
      </div>
    </div>

    <div class="why-content">
      <p>
        Email addresses represent the single most valuable piece of publicly available intelligence an adversary can obtain about a target organization. Unlike credentials, which require exploitation or theft, email addresses are often published openly on corporate websites, embedded in WHOIS domain registration records, exposed through LinkedIn and social media profiles, or leaked in third-party data breaches. This accessibility makes email harvesting the most common starting point for adversarial reconnaissance ,  and the gateway to some of the most devastating attacks in cybersecurity history.
      </p>
      <p>
        Business Email Compromise (BEC) has emerged as the costliest cybercrime globally, with the FBI IC3 reporting $55 billion in cumulative losses between 2013 and 2023. In 2024 alone, total IC3-reported cybercrime losses reached $16.6 billion, with BEC ranking as the second-costliest crime type behind investment fraud. BEC specifically caused $2.7–2.9 billion in losses across 21,000+ reported incidents in 2024, according to analyses by Astra Security and Proofpoint. Phishing and spoofing remained the number-one reported cybercrime with 193,407 incidents in 2024, underscoring that email-based attacks dominate the threat landscape.
      </p>
      <p>
        The average requested wire transfer in BEC attacks continues to escalate year over year, with attackers leveraging increasingly sophisticated impersonation techniques enabled by harvested email addresses. Adversaries don't just collect emails ,  they derive organizational email patterns from employee names (firstname.lastname@company.com), identify high-value targets like CFOs and VP-level executives, and build dossiers that enable convincing social engineering. The email address is not merely contact information; it is the skeleton key that unlocks phishing campaigns, credential harvesting, malware delivery, and financial fraud at unprecedented scale.
      </p>
      <p>
        Defenders must recognize that every publicly exposed email address is a potential attack vector. Organizations that fail to audit and restrict their email exposure are effectively handing adversaries the building blocks for targeted campaigns. From CISA advisories on phishing and ransomware to FBI PSA alerts on BEC tactics, every major cybersecurity authority emphasizes that email address hygiene is a critical first line of defense against the most costly cyber threats facing enterprises today.
      </p>
    </div>

    <div class="source-links">
      <h4>&#128279; Sources &amp; References</h4>
      <ul>
        <li><a href="https://attack.mitre.org/techniques/T1589/002" target="_blank" rel="noopener">MITRE ATT&amp;CK T1589.002</a></li>
        <li><a href="https://www.ic3.gov/PSA/2024/PSA240911" target="_blank" rel="noopener">FBI IC3 PSA ,  BEC Alert</a></li>
        <li><a href="https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-crime-report" target="_blank" rel="noopener">FBI Annual Internet Crime Report</a></li>
        <li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/business-email-compromise" target="_blank" rel="noopener">FBI BEC Overview</a></li>
        <li><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing-and-ransomware" target="_blank" rel="noopener">CISA Phishing &amp; Ransomware Advisories</a></li>
      </ul>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     3. KEY TERMS &amp; CONCEPTS
     ═══════════════════════════════════════════ -->
<section id="terms" class="section">
  <div class="container">
    <div class="section-label">Section 03</div>
    <h2 class="section-title1">Key Terms &amp; <span class="accent-cyan">Concepts</span></h2>
    <p class="section-subtitle">
      Understanding the technical foundation and real-world implications of email address harvesting as an adversarial technique.
    </p>

    <div class="terms-grid">
      <div class="term-card glass">
        <h3>&#128218; Simple Definition</h3>
        <p>
          Email Addresses (T1589.002) is a sub-technique under MITRE ATT&amp;CK's Gather Victim Identity Information tactic, where adversaries systematically collect email addresses of individuals within a target organization. These email addresses are readily available through multiple open-source intelligence (OSINT) channels including corporate websites that list departmental contacts, LinkedIn and professional networking profiles that reveal employee names and organizational email patterns, WHOIS domain registration records that expose administrative and technical contacts, publicly available data breach dumps, and third-party directory services. Once harvested, these emails become the foundation for a wide range of devastating follow-on attacks including mass phishing campaigns designed to harvest credentials, targeted Business Email Compromise (BEC) attacks impersonating executives to initiate fraudulent wire transfers, spear-phishing campaigns tailored to specific individuals using gathered context, and malware delivery via weaponized attachments or malicious links. Adversaries can also algorithmically derive email addresses from employee names by testing common organizational naming conventions such as firstname.lastname@company.com, firstinitiallastname@company.com, or flastname@company.com, rapidly expanding their target list without requiring any direct exposure of those specific addresses.
        </p>
      </div>
      <div class="term-card glass glass-cyan">
        <h3>&#127775; Everyday Analogy</h3>
        <p>
          Think of an email address like a phone number ,  it's your direct line to a specific person within an organization. If someone were to compile a complete phone book listing every employee's number at a company, they could call anyone directly and pretend to be anyone they want ,  the CEO requesting an urgent wire transfer, the IT department asking for a password reset, or HR announcing a new benefits enrollment portal that's actually a credential harvesting site. That's exactly what email harvesting enables at digital scale: adversaries build a comprehensive "phone book" of employee email addresses, then weaponize it by sending perfectly crafted fake messages that appear to come from trusted internal sources. The attacker doesn't need to hack anything initially ,  they simply collect information that's already public, combine it with social engineering, and exploit the inherent trust humans place in familiar-looking email senders and organizational communication patterns. Just as you'd think twice before giving out your personal phone number to strangers, organizations must think carefully about which email addresses they make publicly accessible, because each one represents a potential entry point for a socially engineered attack that could cost millions.
        </p>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     4. REAL-WORLD SCENARIO
     ═══════════════════════════════════════════ -->
<section id="scenario" style="background: linear-gradient(180deg, transparent, rgba(249, 115, 22, 0.02), transparent)" class="section">
  <div class="container">
    <div class="section-label">Section 04</div>
    <h2 class="section-title1">Real-World <span class="accent-orange">Scenario</span></h2>
    <p class="section-subtitle">
      How a single harvested email address enabled a $1.8 million Business Email Compromise attack.
    </p>

    <div class="scenario-wrapper">
      <div class="scenario-character">
        <div class="char-avatar">AT</div>
        <div class="char-info">
          <h3>Angela Torres</h3>
          <p>VP of Finance at Meridian Manufacturing ,  a mid-sized industrial company with 850 employees across 12 facilities. Angela oversees all financial operations including accounts payable, wire transfers, and vendor payments.</p>
        </div>
      </div>

      <div class="scenario-columns">
        <div class="scenario-before">
          <h3>&#10060; Before: The Attack</h3>
          <p>
            Meridian Manufacturing's corporate website listed all department heads' personal email addresses publicly on the "Leadership Team" and "Contact Us" pages ,  including Angela's address, a.torres@meridianmfg.com. Their domain's WHOIS records displayed administrative and technical contact emails tied to the finance department. Employee LinkedIn profiles followed a predictable and easily discoverable email pattern: firstinitial.lastname@meridianmfg.com. Using only open-source intelligence, a threat actor compiled a comprehensive list of over 200 employee email addresses, identifying high-value targets by job title and seniority. The attacker then launched a sophisticated BEC attack impersonating Angela herself ,  registering a lookalike domain (meridian-mfg.com with a hyphen) and sending an urgent, professionally worded email to the CFO requesting an immediate $1.8 million wire transfer to a "new supplier" account in Hong Kong. The email appeared to come from Angela's address, referenced ongoing vendor negotiations, and conveyed appropriate urgency. The CFO, recognizing Angela's name, email format, and the context of supplier payments, complied without verification through out-of-band channels. The $1.8 million was transferred to a Hong Kong shell company account and was irrecoverable within hours ,  fragmented across multiple international transfers designed to obscure the money trail. The entire operation relied on nothing more than a single publicly exposed email address and the predictable naming convention that allowed the attacker to identify and impersonate the right person.
          </p>
        </div>
        <div class="scenario-after">
          <h3>&#9989; After: The Recovery</h3>
          <p>
            Following the devastating BEC loss, Angela Torres led a comprehensive security overhaul of Meridian's email exposure and financial transaction controls. She immediately removed all personal employee email addresses from the public-facing corporate website, replacing them with generic role-based aliases (finance@meridianmfg.com, info@meridianmfg.com) that route through a filtered ticketing system. She implemented DMARC (Domain-based Message Authentication, Reporting, and Conformance) at enforcement policy level, along with DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework) to cryptographically verify legitimate email sources and reject spoofed messages. Angela established mandatory out-of-band verification for all wire transfers exceeding $25,000 ,  requiring a phone call to a pre-registered number using a known voice to confirm every transaction. She deployed mandatory BEC awareness training for all finance team members, with quarterly simulated phishing exercises tailored to reflect real-world BEC scenarios. Finally, Angela subscribed to domain monitoring services that provide real-time alerts whenever lookalike domains are registered (e.g., meridian-mfg.com, meridianmfg.net), enabling proactive takedown requests before attackers can use them in campaigns. These combined measures reduced Meridian's email-based attack surface by over 90% and established multiple verification layers that would prevent a similar attack from succeeding.
          </p>
        </div>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     5. STEP-BY-STEP GUIDE
     ═══════════════════════════════════════════ -->
<section id="guide" class="section">
  <div class="container">
    <div class="section-label">Section 05</div>
    <h2 class="section-title1">Step-by-Step <span class="accent-purple">Defense Guide</span></h2>
    <p class="section-subtitle">
      Seven actionable steps to reduce your organization's email-based attack surface and protect against BEC, phishing, and spear-phishing campaigns.
    </p>

    <div class="steps-list">
      <div class="step-item">
        <div class="step-number">1</div>
        <div class="step-content">
          <h3>Audit Public Email Exposure</h3>
          <p>Conduct a comprehensive audit of every location where your organization's email addresses appear publicly. Search your corporate website, subsidiary sites, press releases, PDF documents, social media profiles, LinkedIn company page, WHOIS records for all registered domains, third-party directories (ZoomInfo, Crunchbase, Yellow Pages), and any data broker listings. Document every email address found, noting its exposure context and the sensitivity of the role it's associated with. Use automated OSINT tools to discover email addresses you may not realize are exposed. Prioritize removal of addresses belonging to executives, finance team members, IT administrators, and anyone with wire transfer authority. This audit should be repeated quarterly as new exposures frequently appear through employee social media activity, conference speaker listings, and third-party publications.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">2</div>
        <div class="step-content">
          <h3>Implement Email Authentication (DMARC/DKIM/SPF)</h3>
          <p>Deploy the three pillars of email authentication to prevent domain spoofing and impersonation attacks. SPF (Sender Policy Framework) publishes a DNS record listing all authorized mail servers for your domain. DKIM (DomainKeys Identified Mail) adds cryptographic signatures to outgoing emails, allowing recipients to verify messages haven't been tampered with in transit. DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM together with a policy that tells receiving servers what to do when authentication fails ,  set this to "p=reject" to block unauthenticated emails claiming to be from your domain. DMARC also provides aggregate and forensic reports that alert you to spoofing attempts targeting your organization. Start with DMARC monitoring (p=none) to baseline your email traffic, then progress to enforcement (p=reject) once you've identified and authorized all legitimate email senders.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">3</div>
        <div class="step-content">
          <h3>Remove Personal Emails from Public-Facing Assets</h3>
          <p>Replace all individual employee email addresses on public-facing websites with generic role-based aliases (info@, support@, sales@) that route through filtered helpdesk or ticketing systems. Update WHOIS records to use domain privacy services that shield administrative contacts. Remove personal emails from LinkedIn profiles or restrict visibility to connections only. Audit all published documents (annual reports, whitepapers, case studies, marketing materials) for embedded email addresses. Implement a corporate policy requiring employees to use generic contact forms rather than listing personal addresses publicly. Consider using email aliases that forward to actual addresses but can be rotated if compromised. For executives and high-value targets, provide separate "public" and "internal" email addresses to compartmentalize risk.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">4</div>
        <div class="step-content">
          <h3>Deploy Advanced Email Threat Protection</h3>
          <p>Implement a multi-layered email security architecture that goes beyond basic spam filtering. Deploy AI-powered email security platforms (such as Proofpoint, Microsoft Defender for Office 365, or Abnormal Security) that analyze communication patterns, detect anomalous sender behavior, and identify BEC-specific indicators like urgency language, wire transfer requests, and domain impersonation. Enable link rewriting and URL sandboxing to detonate malicious links in isolated environments before they reach users. Deploy attachment sandboxing to analyze files for malware in real time. Configure mailbox intelligence to learn each user's typical communication patterns and flag deviations. Implement header anomaly detection to identify spoofed display names, reply-to mismatches, and lookalike domain registrations. Layer these capabilities with your existing secure email gateway for defense-in-depth protection.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">5</div>
        <div class="step-content">
          <h3>Establish Financial Transaction Verification Protocols</h3>
          <p>Create and enforce mandatory out-of-band verification procedures for all financial transactions, especially wire transfers, ACH payments, and changes to vendor banking information. Require a phone call to a pre-registered, independently verified phone number (not a number provided in the email requesting the transfer) for any payment exceeding a defined threshold. Implement dual-authorization requirements for large transactions, ensuring at least two authorized signatories must approve any wire transfer above $25,000. Establish a mandatory cooling-off period (minimum 24 hours) for new vendor payment setup and large transfers to allow additional scrutiny. Create a simple callback verification form that includes the vendor's known contact information, not the contact details from the payment request email. Train finance teams to treat any deviation from established payment procedures as a potential BEC indicator, regardless of the perceived urgency or seniority of the requester.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">6</div>
        <div class="step-content">
          <h3>Train Employees on Email-Based Attacks</h3>
          <p>Implement a comprehensive security awareness training program specifically focused on email-based threats including phishing, spear-phishing, BEC, and social engineering. Conduct monthly simulated phishing exercises that reflect current real-world attack patterns, including CEO impersonation, HR-themed lures, IT support scams, and vendor payment fraud. Use training content that demonstrates specific BEC indicators such as pressure tactics, unusual timing, requests for secrecy, deviations from normal communication channels, and mismatched sender domains. Provide immediate, contextual feedback when employees interact with simulated phishing emails. Track metrics including click rates, reporting rates, and time-to-report, and use these to measure program effectiveness over time. Ensure training is role-specific ,  finance teams need focused BEC training, IT staff need credential harvesting awareness, and all employees need foundational phishing recognition skills. Build a culture where reporting suspicious emails is rewarded, not punished.</p>
        </div>
      </div>
      <div class="step-item">
        <div class="step-number">7</div>
        <div class="step-content">
          <h3>Monitor for Lookalike Domains and Spoofed Emails</h3>
          <p>Subscribe to domain monitoring services that provide real-time alerts whenever new domains are registered containing your company name, trademarks, or executive names (e.g., meridian-mfg.com, meridianmfg-security.com, angela-torres.com). Implement DNS monitoring to detect unauthorized changes to your own domain records that could facilitate email interception. Deploy DMARC reporting tools to continuously analyze authentication failures across the global email ecosystem, identifying ongoing spoofing campaigns targeting your brand. Configure your email security platform to flag incoming emails from newly registered domains or domains with similar character sequences to your organization's domain (homoglyph attacks using characters like rn for m, 0 for o, or unicode lookalikes). Establish a rapid response process for takedown requests when lookalike domains are identified, including relationships with domain registrars and hosting providers. Integrate threat intelligence feeds that provide alerts on your organization's email addresses appearing in data breaches, paste sites, or dark web forums.</p>
        </div>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     6. COMMON MISTAKES &amp; BEST PRACTICES
     ═══════════════════════════════════════════ -->
<section id="mistakes" class="section">
  <div class="container">
    <div class="section-label">Section 06</div>
    <h2 class="section-title1">Common Mistakes &amp; <span class="accent-cyan">Best Practices</span></h2>
    <p class="section-subtitle">
      Avoid these critical errors and adopt proven defenses to protect your organization from email-based reconnaissance and attacks.
    </p>

    <div class="mb-grid">
      <div class="mistakes-list">
        <h3>&#10060; Common Mistakes</h3>

        <div class="mb-item">
          <div class="mb-icon bad">&#10007;</div>
          <p><strong>Publishing executive email addresses on company websites.</strong> Many organizations still list CEO, CFO, and VP email addresses on their "Leadership" or "Contact" pages, providing adversaries with high-value targets for BEC attacks. Every publicly listed executive email is a loaded weapon handed to attackers.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon bad">&#10007;</div>
          <p><strong>Leaving DMARC policy at "none" or not implementing it at all.</strong> A DMARC policy set to p=none means your domain provides zero protection against spoofing ,  receiving servers will deliver unauthenticated emails claiming to be from your organization without any rejection or quarantine.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon bad">&#10007;</div>
          <p><strong>Using predictable email naming conventions without protecting the directory.</strong> When organizations use consistent patterns like firstname.lastname@company.com and make the employee directory accessible, attackers can derive every employee's email from a list of names, instantly creating a complete target list.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon bad">&#10007;</div>
          <p><strong>Allowing wire transfers based solely on email authorization.</strong> Any financial transaction approved through email alone ,  without out-of-band verification via phone call or in-person confirmation ,  is vulnerable to BEC. Attackers specifically target organizations with weak financial verification controls.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon bad">&#10007;</div>
          <p><strong>Ignoring WHOIS exposure and third-party data broker listings.</strong> WHOIS records for your domains may expose administrative and technical contact emails to anyone performing a simple lookup. Data brokers like ZoomInfo, Apollo, and Hunter.io aggregate and sell employee email lists, further expanding your attack surface.</p>
        </div>
      </div>

      <div class="practices-list">
        <h3>&#9989; Best Practices</h3>

        <div class="mb-item">
          <div class="mb-icon good">&#10003;</div>
          <p><strong>Replace personal emails with role-based aliases on all public assets.</strong> Use info@, support@, and sales@ addresses routed through ticketing systems instead of listing individual employee addresses. This eliminates direct targeting while maintaining legitimate customer communication channels.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon good">&#10003;</div>
          <p><strong>Enforce DMARC at p=reject with DKIM and SPF properly configured.</strong> Full email authentication enforcement prevents domain spoofing and ensures that only authenticated messages from your organization reach recipients' inboxes. Monitor DMARC reports weekly for spoofing attempts.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon good">&#10003;</div>
          <p><strong>Mandate out-of-band verification for all financial transactions.</strong> Require phone callback to a pre-registered number for any wire transfer or payment change request. This single control has prevented billions in BEC losses and is recommended by the FBI, CISA, and every major financial institution.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon good">&#10003;</div>
          <p><strong>Subscribe to domain monitoring for lookalike registrations.</strong> Automated monitoring services alert you immediately when domains similar to yours are registered (meridian-mfg.com, meridianmfg.net), enabling rapid takedown before attackers can use them in phishing or BEC campaigns.</p>
        </div>

        <div class="mb-item">
          <div class="mb-icon good">&#10003;</div>
          <p><strong>Conduct quarterly OSINT audits of your email exposure footprint.</strong> Regularly search for your organization's email addresses across the web, data brokers, social media, and breach databases. Each audit should produce a report of new exposures requiring remediation, tracked over time to measure improvement.</p>
        </div>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     7. RED TEAM vs BLUE TEAM VIEW
     ═══════════════════════════════════════════ -->
<section id="teams" class="section">
  <div class="container">
    <div class="section-label">Section 07</div>
    <h2 class="section-title1">Red Team vs <span class="accent-purple">Blue Team</span> View</h2>
    <p class="section-subtitle">
      Understanding email address harvesting from both adversarial and defensive perspectives.
    </p>

    <div class="team-grid">
      <div class="team-card team-red">
        <h3>&#128308; Red Team Perspective</h3>
        <div class="team-role">Attacker Mindset ,  Offensive Operations</div>
        <ul>
          <li>Harvest email addresses from target website contact pages, press releases, and publicly listed team directories using automated scraping tools and manual OSINT collection methodologies.</li>
          <li>Query WHOIS records for all domains owned by the target organization, extracting administrative, technical, and billing contact emails that reveal infrastructure owners and decision-makers.</li>
          <li>Enumerate LinkedIn and professional networking platforms to build a complete organizational chart with employee names, titles, departments, and reporting relationships for targeted spear-phishing.</li>
          <li>Derive email addresses algorithmically by testing common naming conventions (firstname.lastname, flastname, firstnamelastname) against the identified domain using email verification tools and SMTP probing.</li>
          <li>Cross-reference harvested emails against known data breach databases (Have I Been Pwned, BreachDirectory) to identify previously compromised credentials that enable credential stuffing and initial access.</li>
          <li>Prioritize high-value targets including C-suite executives, finance team members with wire transfer authority, IT administrators with privileged access, and HR personnel who can facilitate follow-on attacks.</li>
          <li>Use the compiled email list to craft personalized phishing lures, register lookalike domains for BEC campaigns, and build convincing social engineering scenarios tailored to each target's role and organizational context.</li>
        </ul>
      </div>
      <div class="team-card team-blue">
        <h3>&#128309; Blue Team Perspective</h3>
        <div class="team-role">Defender Mindset ,  Defensive Operations</div>
        <ul>
          <li>Conduct regular OSINT assessments to discover and catalog every publicly exposed email address associated with the organization, treating each as a potential attack vector requiring remediation or monitoring.</li>
          <li>Implement comprehensive email authentication (DMARC p=reject, DKIM, SPF) to prevent domain spoofing and receive forensic reports about authentication failures that indicate active spoofing campaigns targeting the brand.</li>
          <li>Deploy AI-powered email security platforms that analyze communication patterns, detect BEC-specific indicators (urgency, financial requests, vendor impersonation), and quarantine suspicious messages before they reach end users.</li>
          <li>Establish and enforce mandatory out-of-band verification protocols for financial transactions, ensuring no wire transfer or payment change is processed based solely on email communication regardless of the perceived sender.</li>
          <li>Monitor DMARC aggregate and forensic reports continuously for unauthorized senders attempting to spoof organizational domains, and track trends over time to identify targeted campaigns against the organization.</li>
          <li>Implement domain monitoring services that alert on lookalike domain registrations containing company trademarks, executive names, or character substitutions designed to deceive employees and external partners.</li>
          <li>Run regular phishing simulation exercises tailored to BEC and spear-phishing scenarios, tracking metrics to measure awareness improvement and identify departments requiring additional focused training.</li>
        </ul>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     8. THREAT HUNTER'S EYE
     ═══════════════════════════════════════════ -->
<section id="hunter" class="section">
  <div class="container">
    <div class="section-label">Section 08</div>
    <h2 class="section-title1">Threat Hunter's <span class="accent-orange">Eye</span></h2>
    <p class="section-subtitle">
      Detection queries, indicators of compromise, and hunting strategies for identifying email address harvesting and related attack activity.
    </p>

    <div class="hunter-grid">
      <div class="hunter-card">
        <span class="hunter-icon">&#128269;</span>
        <h4>Detection Queries</h4>
        <p>
          Monitor email gateway logs for authentication failures from external IPs attempting to verify harvested email addresses via SMTP VRFY or RCPT TO enumeration. Track DMARC forensic reports (ruf) for spoofed sender domains and analyze aggregate reports (rua) for authentication failure patterns. Query proxy logs for connections to known data broker services (Hunter.io, Snov.io, Apollo) that indicate active email harvesting against your organization. Search email logs for messages with mismatched Reply-To and From headers, a classic indicator of BEC preparation. Monitor DNS query logs for lookups of recently registered domains containing your company name or executive names, which often precede BEC campaigns using the harvested email intelligence.
        </p>
        <div class="hunter-query">
          index=email_gateway (authentication_fail="true") OR (dmarc_fail="true") | stats count by sender_domain, recipient
        </div>
      </div>

      <div class="hunter-card">
        <span class="hunter-icon">&#128200;</span>
        <h4>Key Indicators of Compromise</h4>
        <p>
          Watch for spikes in authentication failure rates on your mail servers that could indicate an adversary probing your email directory for valid addresses. Monitor for incoming emails from domains registered within the past 30 days, especially those containing typosquatting variations of your domain. Track employee email addresses appearing in fresh data breach dumps or paste sites (monitor Have I Been Pwned API and dark web intelligence feeds). Look for unusual volumes of out-of-office replies to external senders, which attackers use to confirm active email addresses and gather organizational intelligence. Monitor for emails with display name spoofing where the visible sender name matches an internal employee but the underlying email address belongs to an external domain.
        </p>
        <div class="hunter-query">
          index=proxy domain IN ("hunter.io","snov.io","apollo.io","zoominfo.com") src_ip!=internal_range
        </div>
      </div>

      <div class="hunter-card">
        <span class="hunter-icon">&#127919;</span>
        <h4>Hunting Strategy</h4>
        <p>
          Adopt a hypothesis-driven hunting approach: assume adversaries have already harvested your email addresses and hunt for evidence of that intelligence being weaponized. Start by identifying all emails sent to finance team members that contain financial terminology, urgency indicators, or vendor-related language ,  then cross-reference sender domains against known BEC patterns. Hunt for newly registered domains using passive DNS databases (VirusTotal, SecurityTrails) that contain your company name or common misspellings. Correlate DMARC failure data with geographic anomalies ,  spoofing attempts from countries where your organization has no business presence are high-priority indicators. Establish a baseline of normal email communication volumes and flag statistically significant deviations, especially sudden increases in external emails targeting specific departments during off-hours, which correlates with active BEC campaigns.
        </p>
        <div class="hunter-query">
          index=dns newly_registered=true domain="*yourcompany*" | table domain, registrar, created, name_servers
        </div>
      </div>
    </div>
  </div>
</section>

<hr class="section-divider">

<!-- ═══════════════════════════════════════════
     9. CALL-TO-ACTION
     ═══════════════════════════════════════════ -->
<section class="section cta-section" id="cta">
  <div class="container">
    <div class="section-label">Section 09</div>
    <h2 class="section-title1">Continue <span class="accent-cyan">Exploring</span></h2>

    <div class="cta-box">
      <h2>Master the Full Reconnaissance Kill Chain</h2>
      <p>
        Email address harvesting is one piece of the adversary's identity collection puzzle. Explore the parent technique and sibling sub-techniques to understand the complete reconnaissance methodology and build comprehensive defenses across all identity gathering vectors.
      </p>
      <div class="cta-links">
        <a href="T1589_Gather_Victim_Identity_Information.html" class="cta-link primary">
          &#9654; T1589 ,  Gather Victim Identity Information (Parent)
        </a>
        <a href="T1589.001_Credentials.html" class="cta-link secondary">
          &#128274; T1589.001 ,  Credentials
        </a>
        <a href="T1589.003_Employee_Names.html" class="cta-link tertiary">
          &#128100; T1589.003 ,  Employee Names
        </a>
      </div>
    </div>
  </div>
</section>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-21127e8 e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="21127e8" data-element_type="container">
				<div class="elementor-element elementor-element-60560a3 elementor-widget elementor-widget-html" data-id="60560a3" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					
    <div class="attack-card">
        <!-- header with main technique context -->
        <div class="technique-header" style="text-align: center">
            <h2><i class="fas fa-radar" style="font-size: 1.2rem;margin-right: 8px;color: #2de0c0"></i>Email Addresses</h2>
        </div>
        <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 10px 0">

        <!-- MITIGATIONS section (pre-compromise) -->
        <div style="margin-bottom: 1.5rem">
            <div class="section-title">
                <i class="fas fa-shield-virus"></i> MITIGATIONS
            </div>
            <div class="mitigation-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Pre-compromise</span>
                    <span class="small-tag" style="text-align: center">M1056</span>
                </a>
            </div>
        </div>

        <!-- DETECTION section -->
        <div style="margin-bottom: 1rem">
            <div class="section-title">
                <i class="fas fa-eye"></i> DETECTION STRATEGY
            </div>
            <div class="detection-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Detection of Hardware</span>
                    <span class="small-tag" style="text-align: center">DET0887</span>
                </a>
            </div>
        </div>
    </div>
    
        <!-- ========== END OF PAGE – DONATION BOX : BRIEF, DIRECT, HONEST ========== -->
    <div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
		<div data-wpr-particles="{&quot;particles&quot;:{&quot;number&quot;:{&quot;value&quot;:400,&quot;density&quot;:{&quot;enable&quot;:true,&quot;value_area&quot;:800}},&quot;color&quot;:{&quot;value&quot;:&quot;#000000&quot;},&quot;shape&quot;:{&quot;type&quot;:&quot;circle&quot;,&quot;stroke&quot;:{&quot;width&quot;:0,&quot;color&quot;:&quot;#000000&quot;},&quot;polygon&quot;:{&quot;nb_sides&quot;:5},&quot;image&quot;:{&quot;src&quot;:&quot;img/github.svg&quot;,&quot;width&quot;:100,&quot;height&quot;:100}},&quot;opacity&quot;:{&quot;value&quot;:0.5,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:1,&quot;opacity_min&quot;:0.1,&quot;sync&quot;:false}},&quot;size&quot;:{&quot;value&quot;:10,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:40,&quot;size_min&quot;:0.1,&quot;sync&quot;:false}},&quot;line_linked&quot;:{&quot;enable&quot;:false,&quot;distance&quot;:500,&quot;color&quot;:&quot;#000000&quot;,&quot;opacity&quot;:0.4,&quot;width&quot;:2},&quot;move&quot;:{&quot;enable&quot;:true,&quot;speed&quot;:6,&quot;direction&quot;:&quot;bottom&quot;,&quot;random&quot;:false,&quot;straight&quot;:false,&quot;out_mode&quot;:&quot;out&quot;,&quot;bounce&quot;:false,&quot;attract&quot;:{&quot;enable&quot;:false,&quot;rotateX&quot;:600,&quot;rotateY&quot;:1200}}},&quot;interactivity&quot;:{&quot;detect_on&quot;:&quot;window&quot;,&quot;events&quot;:{&quot;onhover&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;bubble&quot;},&quot;onclick&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;repulse&quot;},&quot;resize&quot;:true},&quot;modes&quot;:{&quot;grab&quot;:{&quot;distance&quot;:400,&quot;line_linked&quot;:{&quot;opacity&quot;:0.5}},&quot;bubble&quot;:{&quot;distance&quot;:400,&quot;size&quot;:4,&quot;duration&quot;:0.3,&quot;opacity&quot;:1,&quot;speed&quot;:3},&quot;repulse&quot;:{&quot;distance&quot;:200,&quot;duration&quot;:0.4},&quot;push&quot;:{&quot;particles_nb&quot;:4},&quot;remove&quot;:{&quot;particles_nb&quot;:2}}},&quot;retina_detect&quot;:true}" particle-source="wpr_particle_json" wpr-quantity="100" wpr-color="#FFFFFF" wpr-speed="3" wpr-shape="circle" wpr-size="4" class="elementor-element elementor-element-02433eb e-con-full wpr-particle-yes e-flex wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="02433eb" data-element_type="container">
				<div class="elementor-element elementor-element-85070ac elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="85070ac" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-2b27df5 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="2b27df5" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-b305794 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info" data-id="b305794" data-element_type="widget" data-widget_type="wpr-post-info.default">
				<div class="elementor-widget-container">
					<ul class="wpr-post-info wpr-post-info-horizontal"><li class="wpr-post-info-author"><span class="wpr-post-info-text"><i aria-hidden="true" class="far fa-copyright"></i></span><span>Cyber Pulse Academy</span></li><li class="wpr-post-info-date"><span>February 13, 2026</span></li><li class="wpr-post-info-comments"><span>  No Comments</span></li></ul>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f05dea5 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="f05dea5" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-fd94d72 wpr-comment-reply-separate wpr-comment-reply-align-right elementor-widget elementor-widget-wpr-post-comments" data-id="fd94d72" data-element_type="widget" data-widget_type="wpr-post-comments.default">
				<div class="elementor-widget-container">
					<div class="wpr-comments-wrap" id="comments">	<div id="respond" class="comment-respond">
		<h3 id="wpr-reply-title" class="wpr-comment-reply-title">Leave a Comment <small><a rel="nofollow" id="cancel-comment-reply-link" href="/tag/t1589/feed/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://www.cyberpulseacademy.com/comments/" method="post" id="wpr-comment-form" class="wpr-comment-form wpr-cf-style-6 wpr-cf-no-url" novalidate><p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p><div class="wpr-comment-form-text"><textarea name="comment" placeholder="Message*" cols="45" rows="8" maxlength="65525"></textarea></div><div class="wpr-comment-form-fields"> <div class="wpr-comment-form-author"><input type="text" name="author" placeholder="Name*"/></div>
<div class="wpr-comment-form-email"><input type="text" name="email" placeholder="Email*"/></div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="wpr-submit-comment" class="wpr-submit-comment" value="Submit" /> <input type='hidden' name='comment_post_ID' value='12568' id='comment_post_ID' />
<input type='hidden' name='comment_parent' id='comment_parent' value='0' />
</p><p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="256b79867c" /></p><br /><div  class='g-recaptcha lz-recaptcha' data-sitekey='6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' data-theme='light' data-size='normal'></div>
<noscript>
	<div style='width: 302px; height: 352px;'>
		<div style='width: 302px; height: 352px; position: relative;'>
			<div style='width: 302px; height: 352px; position: absolute;'>
				<iframe src='https://www.google.com/recaptcha/api/fallback?k=6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' frameborder='0' scrolling='no' style='width: 302px; height:352px; border-style: none;'>
				</iframe>
			</div>
			<div style='width: 250px; height: 80px; position: absolute; border-style: none; bottom: 21px; left: 25px; margin: 0px; padding: 0px; right: 25px;'>
				<textarea name='g-recaptcha-response' class='g-recaptcha-response' style='width: 250px; height: 80px; border: 1px solid #c1c1c1; margin: 0px; padding: 0px; resize: none;' value=''>
				</textarea>
			</div>
		</div>
	</div>
</noscript><br><p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="94"/><script>document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>	</div><!-- #respond -->
	</div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-ff46f57 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="ff46f57" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-bc62d65 wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="bc62d65" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.cyberpulseacademy.com/email-addresses-t1589-002/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Credentials &#8211; T1589.001</title>
		<link>https://www.cyberpulseacademy.com/credentials-t1589-001/</link>
					<comments>https://www.cyberpulseacademy.com/credentials-t1589-001/#respond</comments>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 03:16:07 +0000</pubDate>
				<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[Reconnaissance]]></category>
		<category><![CDATA[T1589]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=12566</guid>

					<description><![CDATA[Credentials MITIGATIONS Pre-compromise M1056 DETECTION STRATEGY Detection of Hardware DET0887 DONATE · SUPPORT We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution &#8211; no matter the size &#8211; makes this platform sustainable. 100% of your support goes to the platform. No corporate sponsors, just the community. ROOT::DONATE Donate Now Cyber Pulse Academy February 13, 2026 No Comments Leave a Comment Cancel reply Logged in as Cyber Pulse Academy. Edit your profile. Log out? Required fields are marked * &#916;]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="12566" class="elementor elementor-12566" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-3ca604a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="3ca604a" data-element_type="container">
		<div class="elementor-element elementor-element-a565f16 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="a565f16" data-element_type="container">
				<div class="elementor-element elementor-element-c336e5c elementor-widget elementor-widget-template" data-id="c336e5c" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="12459" class="elementor elementor-12459" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-0261976 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="0261976" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5057119 elementor-widget elementor-widget-html" data-id="5057119" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<!-- Floating Particles -->
<div class="particles" aria-hidden="true">
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
</div>

<!-- ======== HERO / SIMULATION ======== -->
<header class="hero" id="simulation">
  <div class="hero-bg" aria-hidden="true"></div>
  <div class="grid-lines" aria-hidden="true"></div>
  <div class="hex-pattern" aria-hidden="true"></div>

  <div class="sim-wrapper">
    <div class="hero-title">
      <span class="tag">T1589.001, Reconnaissance</span>
      <h1 class="glitch-text">Credentials</h1>
      <div class="subtitle">Adversaries harvest login credentials, passwords, API keys, session tokens, through breaches, phishing, and dark web marketplaces...</div>
    </div>

    <!-- Credential Interception Simulation -->
    <div class="cred-sim" aria-label="Animated CSS-only credential interception simulation">
      <!-- Scan Line -->
      <div class="scan-line" aria-hidden="true"></div>

      <!-- Credential Drips -->
      <div class="cred-drip" aria-hidden="true"></div>
      <div class="cred-drip" aria-hidden="true"></div>
      <div class="cred-drip" aria-hidden="true"></div>
      <div class="cred-drip" aria-hidden="true"></div>
      <div class="cred-drip" aria-hidden="true"></div>
      <div class="cred-drip" aria-hidden="true"></div>

      <!-- Intercept Badge -->
      <div class="intercept-badge">&#9888; INTERCEPTED</div>

      <!-- Three-column layout: Login Form → Flow → Dark Web DB -->
      <div class="sim-grid">

        <!-- Login Form (Left) -->
        <div class="login-form">
          <div class="form-title">&#128274; User Login Portal</div>
          <div class="form-field">
            <label>Username</label>
            <div class="typed-text"><span class="typed-user">admin@summitfs.com</span></div>
          </div>
          <div class="form-field">
            <label>Password</label>
            <div class="typed-text"><span class="typed-pass">&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;</span></div>
          </div>
          <div class="form-submit">SIGN IN</div>
          <div style="margin-top:.4rem;font-family:'Share Tech Mono',monospace;font-size:.45rem;color:#ff4444">! credentials captured in transit</div>
        </div>

        <!-- Flow Connector (Center) -->
        <div class="flow-connector">
          <div class="flow-label">DATA EXFIL</div>
          <div class="flow-line"></div>
          <div class="flow-dot"></div>
          <div class="flow-line"></div>
          <div class="flow-dot"></div>
          <div class="flow-line"></div>
          <div class="flow-dot"></div>
        </div>

        
        <div class="darkweb-db">
          <div class="form-title">&#128373; Dark Web Marketplace</div>
          <div class="db-header">
            <span class="db-count"><span>&#9679;</span> LIVE FEED</span>
            <span style="font-family:'Share Tech Mono',monospace;font-size:.45rem;color:#ff4444">16B+ records</span>
          </div>
          <div class="db-entry"><span class="db-user">j.smith</span><span class="db-email">j.sm***@gmail.com</span><span class="db-pass">qW3!tR</span><span class="db-source">Breached</span></div>
          <div class="db-entry"><span class="db-user">m.chen</span><span class="db-email">mc***@corp.io</span><span class="db-pass">S7$yNp</span><span class="db-source">Phished</span></div>
          <div class="db-entry"><span class="db-user">a.kumar</span><span class="db-email">ak***@bank.com</span><span class="db-pass">B4#mKx</span><span class="db-source">Breached</span></div>
          <div class="db-entry"><span class="db-user">admin@summitfs.com</span><span class="db-email">ad***@summitfs.com</span><span class="db-pass">&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;&#9679;</span><span class="db-source"><span class="db-new">NEW</span></span></div>
          <div class="db-entry"><span class="db-user">s.jones</span><span class="db-email">sj***@health.org</span><span class="db-pass">Lp9@fG</span><span class="db-source">Scraped</span></div>
          <div class="db-entry"><span class="db-user">r.patel</span><span class="db-email">rp***@gov.us</span><span class="db-pass">Xk2%hV</span><span class="db-source">Breached</span></div>
        </div>
      </div>

      <!-- Credential Strength Meter -->
      <div class="strength-section">
        <div class="strength-label">&#128273; Credential Strength Analysis</div>
        <div class="strength-row">
          <span class="strength-example">password123</span>
          <div class="strength-bar-wrap"><div class="strength-bar weak"></div></div>
          <span class="strength-tag weak">WEAK</span>
        </div>
        <div class="strength-row">
          <span class="strength-example">Summer2024!</span>
          <div class="strength-bar-wrap"><div class="strength-bar medium"></div></div>
          <span class="strength-tag medium">MEDIUM</span>
        </div>
        <div class="strength-row">
          <span class="strength-example">xK9$mQ2&amp;vL7@nW4</span>
          <div class="strength-bar-wrap"><div class="strength-bar strong"></div></div>
          <span class="strength-tag strong">STRONG</span>
        </div>
      </div>

      <!-- Lock Icons -->
      <div class="locks-section">
        <div class="lock-item">
          <div class="lock-icon-wrap broken">
            <span class="lock-body">&#128275;</span>
          </div>
          <span class="lock-label broken">Compromised</span>
        </div>
        <div class="lock-item">
          <div class="lock-icon-wrap broken">
            <span class="lock-body">&#128275;</span>
          </div>
          <span class="lock-label broken">Compromised</span>
        </div>
        <div class="lock-item">
          <div class="lock-icon-wrap secure">
            <span class="lock-body">&#128274;</span>
          </div>
          <span class="lock-label secure">MFA Protected</span>
        </div>
        <div class="lock-item">
          <div class="lock-icon-wrap broken">
            <span class="lock-body">&#128275;</span>
          </div>
          <span class="lock-label broken">Compromised</span>
        </div>
        <div class="lock-item">
          <div class="lock-icon-wrap secure">
            <span class="lock-body">&#128274;</span>
          </div>
          <span class="lock-label secure">Secured</span>
        </div>
      </div>

      <!-- Counter -->
      <div class="counter-section">
        <div class="counter-label">Credentials Leaked in 2025</div>
        <div class="counter-value">
          <span class="counter-digit-wrap"><span class="counter-digit d0">1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9<br>0</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d1">6<br>7<br>8<br>9<br>0<br>1<br>2<br>3<br>4<br>5</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d2">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d3">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d4">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d5">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d6">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d7">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d8">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d9">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d10">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-digit-wrap"><span class="counter-digit d11">0<br>1<br>2<br>3<br>4<br>5<br>6<br>7<br>8<br>9</span></span>
          <span class="counter-suffix">+</span>
        </div>
        <div class="counter-sub">The largest credential breach in internet history</div>
      </div>
    </div>

    <!-- Status Indicators -->
    <div class="status-bar" aria-label="Credential gathering status">
      <div class="status-indicator">
        <span class="status-dot"></span>
        PHISHING
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        BREACH SCRAPE
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        DARK WEB BUY
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        STUFFING
      </div>
    </div>
  </div>
</header>

<!-- ======== SECTION 2: WHY IT MATTERS ======== -->
<section id="why" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 02</div>
      <h2>Why Credential Gathering Matters</h2>
      <div class="divider"></div>
    </div>

    <!-- Warning Banner -->
    <div class="warning-banner">
      <span class="warning-icon">&#9888;</span>
      <p>
        <strong class="text-red">Critical Threat:</strong> Credential gathering is the most impactful identity reconnaissance technique in the modern threat landscape. Stolen credentials are the <strong class="text-purple">top initial access vector</strong>, initiating <strong class="text-red">22% of all breaches in 2025</strong> according to the Verizon DBIR as reported by Vectra AI. The scale of the problem is staggering: <strong class="text-red">16 BILLION passwords were leaked in 2025 alone</strong>, the largest credential breach in internet history, encompassing credentials from Google, Meta, Apple, and countless other platforms, as documented by Cybernews. Account takeover attacks increased by <strong class="text-purple">250% in 2024</strong> (LinkedIn/Shane Brown) and account compromise surged by <strong class="text-red">389%</strong> according to Vectra's threat research. Malicious actors systematically use stolen credentials for credential-stuffing attacks to infiltrate enterprise systems, leveraging the fact that the average person reuses passwords across multiple services, making a single breach a gateway to dozens of downstream compromises across unrelated platforms and organizations worldwide.
      </p>
    </div>

    <div class="stat-grid">
      <div class="stat-box">
        <div class="stat-number red">16B+</div>
        <div class="stat-label">Credentials Leaked in 2025</div>
      </div>
      <div class="stat-box">
        <div class="stat-number text-purple">22%</div>
        <div class="stat-label">Breaches Initiated by Stolen Credentials</div>
      </div>
      <div class="stat-box">
        <div class="stat-number red">389%</div>
        <div class="stat-label">Surge in Account Compromise</div>
      </div>
      <div class="stat-box">
        <div class="stat-number text-purple">250%</div>
        <div class="stat-label">Increase in ATO Attacks (2024)</div>
      </div>
    </div>

    <div class="glass-card">
      <p>
        Credential theft is the number one initial access vector in modern cyberattacks according to Vectra's comprehensive threat intelligence reports. Adversaries no longer need to find zero-day vulnerabilities or execute sophisticated exploits when they can simply purchase valid credentials for pennies on dark web marketplaces. The economics of credential-based attacks are devastating: a single valid credential pair costs as little as $0.50 on underground forums, while the average cost of a credential-driven breach exceeds $4.5 million. Organizations that fail to monitor for breached credentials, enforce unique password policies, and implement multi-factor authentication are effectively leaving their front doors wide open. The attack chain is remarkably simple, obtain credentials from a breach database, test them against target services using automated credential-stuffing tools, and leverage successful authentications to establish persistent access, escalate privileges, and move laterally through the network. This is why T1589.001 remains one of the most frequently observed sub-techniques across all industry sectors and threat actor profiles.
      </p>
    </div>

    <div class="ref-links">
      <a href="https://attack.mitre.org/techniques/T1589/001" rel="dofollow noopener" target="_blank">MITRE ATT&amp;CK T1589.001</a>
      <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing-and-ransomware" rel="dofollow noopener" target="_blank">CISA Malware &amp; Phishing</a>
      <a href="https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-crime-report" rel="dofollow noopener" target="_blank">FBI Internet Crime Report</a>
      <a href="https://www.idtheftcenter.org/wp-content/uploads/2025/02/ITRC_2024DataBreachReport_Final_020325.pdf" rel="dofollow noopener" target="_blank">ITRC 2024 Data Breach Report</a>
      <a href="https://www.vectra.ai/topics/credential-theft" rel="dofollow noopener" target="_blank">Vectra Credential Theft Research</a>
    </div>
  </div>
</section>

<!-- ======== SECTION 3: KEY TERMS &amp; CONCEPTS ======== -->
<section id="concepts" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 03</div>
      <h2>Key Terms &amp; Concepts</h2>
      <div class="divider"></div>
    </div>

    <div class="def-box">
      <div class="def-label">&#128218; Simple Definition</div>
      <p>
        <strong class="text-purple">Credentials (T1589.001)</strong> is a sub-technique within MITRE ATT&amp;CK's Reconnaissance tactic where adversaries gather login credentials, usernames, passwords, API keys, session tokens, cookies, and authentication certificates, through various means including phishing campaigns, purchasing from dark web marketplaces, exploiting data breaches, or scraping compromised databases. This sub-technique is classified under the parent technique T1589 (Gather Victim Identity Information), which falls within the broader Reconnaissance tactic (TA0043). Gathered credentials serve multiple downstream attack purposes: <strong class="text-cyan">credential stuffing</strong> (automated testing of leaked username-password pairs against other services to exploit password reuse), <strong class="text-cyan">password spraying</strong> (testing a small number of common passwords against many accounts to avoid lockout detection), and <strong class="text-cyan">direct account takeover</strong> (using valid credentials to impersonate legitimate users and gain unauthorized access to systems, data, and privileged operations). The technique targets both individual personal accounts and organizational enterprise credentials, with the latter commanding significantly higher prices on underground markets due to their potential for access to sensitive corporate networks, intellectual property, and financial systems.
      </p>
    </div>

    <div class="analogy-box">
      <div class="def-label">&#128161; Everyday Analogy</div>
      <p>
        Imagine someone finds a master key ring at a hotel front desk. That single key ring contains keys to every room in the building, the lobby, the maintenance closet, the manager's office, and every guest room. The person doesn't need to pick any locks, bypass any security systems, or trick any employees, they just try each key until they find one that works, then walk right in. Stolen credentials work exactly the same way: attackers obtain massive lists of username-password pairs from data breaches (the equivalent of finding the master key ring), and systematically test them across hundreds of services and platforms, knowing that <strong class="text-red">65% of people reuse passwords across multiple accounts</strong>. A password exposed in a breached fitness app from three years ago might still unlock an employee's corporate VPN, email, cloud storage, and banking portal today. Each successful match is like finding an open door, no exploit required, no alarm triggered, and the legitimate user has no idea their identity has been hijacked until the damage is already done.
      </p>
    </div>

    <div class="accent-line"></div>

    <div class="glass-card">
      <h3 class="text-purple">&#128270; Related Terminology</h3>
      <table class="data-table">
        <thead>
          <tr><th>Term</th><th>Definition</th><th>Relevance to T1589.001</th></tr>
        </thead>
        <tbody>
          <tr><td class="text-purple">Credential Stuffing</td><td>Automated testing of breached credential pairs against multiple services</td><td>Primary downstream attack using gathered credentials</td></tr>
          <tr><td class="text-purple">Password Spraying</td><td>Testing common passwords against many accounts to avoid lockouts</td><td>Complementary technique leveraging credential lists</td></tr>
          <tr><td class="text-purple">Account Takeover (ATO)</td><td>Unauthorized access to a user account using valid credentials</td><td>End goal of credential gathering operations</td></tr>
          <tr><td class="text-purple">Credential Dumping</td><td>Extracting credentials from memory or system stores post-compromise</td><td>Different technique (T1003) but related outcome</td></tr>
          <tr><td class="text-purple">Session Hijacking</td><td>Stealing session tokens to impersonate authenticated users</td><td>Targets session credentials specifically</td></tr>
        </tbody>
      </table>
    </div>
  </div>
</section>

<!-- ======== SECTION 4: REAL-WORLD SCENARIO ======== -->
<section id="scenario" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 04</div>
      <h2>Real-World Scenario</h2>
      <div class="divider"></div>
    </div>

    <div class="glow-card">
      <h3>&#128100; <span class="text-purple">Marcus Johnson</span>, Director of IT Security, Summit Financial Services</h3>
      <p class="text-muted" style="font-size:.85rem">A regional bank serving 200,000 customers across 12 branches in the southeastern United States, with 450 employees and growing digital banking operations managing $2.3 billion in assets under management.</p>
    </div>

    <div class="scenario-timeline">
      <div class="timeline-item bad">
        <h4>&#128308; Before: The Breach Chain</h4>
        <p>
          Summit Financial Services had no breached credential monitoring in place and no formal password reuse policies for employees. An employee in the accounting department had been using the same password, "Summit2023!", across their work VPN, corporate email, personal banking, and a popular fitness tracking application. When that fitness app suffered a data breach, the employee's credentials were dumped onto a dark web marketplace along with 47 million other records from the same breach. The attackers purchased the credential list for $150, ran automated credential-stuffing tools against the VPN portal of Summit Financial, and within 48 hours had gained access to the employee's VPN account. From there, they moved laterally through the internal network using standard administrative tools, eventually compromising the customer database containing 85,000 account records including names, Social Security numbers, account balances, and transaction histories. The breach went undetected for 14 days until a customer reported unauthorized transactions on their account. The total damage included $4.2 million in regulatory fines under financial data protection laws (GLBA and state-level regulations), $7.8 million in total remediation costs including forensic investigation, customer notification, credit monitoring services, and network infrastructure upgrades, and an incalculable loss of customer trust that resulted in a 12% decline in new account openings over the following quarter.
        </p>
      </div>

      <div class="timeline-item good">
        <h4>&#128994; After: The Recovery &amp; Hardening</h4>
        <p>
          Marcus Johnson led a comprehensive credential security overhaul following the breach. First, he implemented automated breached credential monitoring by integrating the <strong class="text-cyan">Have I Been Pwned</strong> API into the organization's identity management system, enabling real-time alerts whenever employee credentials appeared in known breach databases. Second, he enforced unique, randomly generated passwords across all systems using an enterprise password manager deployment, eliminating password reuse across 100% of employee accounts within 30 days. Third, he deployed multi-factor authentication (MFA) on all external-facing services including the VPN portal, webmail, customer-facing applications, and all administrative access points, with hardware security keys for privileged accounts. Fourth, he implemented conditional access policies that evaluated login attempts based on device health, geographic location, time of access, and risk score, automatically blocking suspicious authentication attempts. Fifth, he launched a company-wide password hygiene training program with mandatory quarterly refresher courses and simulated phishing exercises to maintain employee awareness. The result: credential-based attack attempts dropped by <strong class="text-green">94%</strong> within the first quarter, and zero successful credential-based intrusions were detected in the subsequent 18 months, transforming Summit Financial from a vulnerable target into a hardened organization with industry-leading credential security practices.
        </p>
      </div>
    </div>

    <div class="stat-grid">
      <div class="stat-box">
        <div class="stat-number red">$4.2M</div>
        <div class="stat-label">Regulatory Fines</div>
      </div>
      <div class="stat-box">
        <div class="stat-number red">$7.8M</div>
        <div class="stat-label">Total Remediation Cost</div>
      </div>
      <div class="stat-box">
        <div class="stat-number text-green">94%</div>
        <div class="stat-label">Drop in Credential Attacks</div>
      </div>
      <div class="stat-box">
        <div class="stat-number cyan">85,000</div>
        <div class="stat-label">Records Compromised</div>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 5: STEP-BY-STEP GUIDE ======== -->
<section id="guide" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 05</div>
      <h2>7-Step Credential Defense Guide</h2>
      <div class="divider"></div>
    </div>

    <div class="steps-grid">
      <!-- Step 1 -->
      <div class="step-card">
        <div class="step-num">01</div>
        <div class="step-content">
          <h4>Audit and Monitor for Breached Credentials</h4>
          <p>Continuously monitor your organization's domains and employee email addresses against known breach databases to detect when credentials have been exposed. This is the foundational step, you cannot protect what you do not know has been compromised.</p>
          <ul>
            <li>Integrate Have I Been Pwned (HIBP) API or similar breach notification services into your identity management system</li>
            <li>Use tools like Microsoft Secure Score, Google Password Checkup, or SpyCloud for enterprise breach monitoring</li>
            <li>Set up automated alerts to trigger within 24 hours of any credential exposure detection</li>
            <li>Conduct quarterly credential exposure audits across all corporate domains and subsidiaries</li>
          </ul>
        </div>
      </div>

      <!-- Step 2 -->
      <div class="step-card">
        <div class="step-num">02</div>
        <div class="step-content">
          <h4>Enforce Strong, Unique Password Policies</h4>
          <p>Eliminate password reuse across all systems by deploying an enterprise password manager and enforcing minimum complexity requirements. The goal is to ensure that a breach on any external service never compromises your organization's credentials.</p>
          <ul>
            <li>Deploy an enterprise password manager (1Password Business, Bitwarden, Dashlane Business) to all employees</li>
            <li>Enforce minimum 16-character passwords with passphrase support enabled across all systems</li>
            <li>Block known breached passwords using services like Azure AD Password Protection or custom banned lists</li>
            <li>Eliminate mandatory periodic password rotations (NIST SP 800-63B guidance) to reduce unsafe behaviors</li>
          </ul>
        </div>
      </div>

      <!-- Step 3 -->
      <div class="step-card">
        <div class="step-num">03</div>
        <div class="step-content">
          <h4>Deploy Multi-Factor Authentication (MFA) Everywhere</h4>
          <p>MFA is the single most effective defense against credential-based attacks. Even if an attacker obtains valid credentials, they cannot authenticate without the second factor, effectively neutralizing credential stuffing and password spraying campaigns.</p>
          <ul>
            <li>Require MFA on all external-facing services: VPN, webmail, cloud applications, remote desktop, and admin panels</li>
            <li>Prioritize FIDO2/WebAuthn hardware security keys (YubiKey, etc.) for privileged and admin accounts</li>
            <li>Use push-based authenticator apps (Microsoft Authenticator, Google Authenticator) as minimum for all users</li>
            <li>Disable SMS-based OTP where possible due to SIM-swapping vulnerabilities; use TOTP or push as minimum fallback</li>
          </ul>
        </div>
      </div>

      <!-- Step 4 -->
      <div class="step-card">
        <div class="step-num">04</div>
        <div class="step-content">
          <h4>Implement Conditional Access Policies</h4>
          <p>Go beyond static authentication by evaluating every login attempt against contextual risk factors. Conditional access policies can automatically block or challenge suspicious authentication attempts even when valid credentials are used.</p>
          <ul>
            <li>Configure risk-based authentication that evaluates device health, IP reputation, and behavioral patterns</li>
            <li>Block or step-up authentication for logins from impossible travel scenarios or unfamiliar geographic locations</li>
            <li>Enforce compliance checks requiring up-to-date operating systems and endpoint protection before granting access</li>
            <li>Implement session timeouts and re-authentication requirements for sensitive operations and privileged actions</li>
          </ul>
        </div>
      </div>

      <!-- Step 5 -->
      <div class="step-card">
        <div class="step-num">05</div>
        <div class="step-content">
          <h4>Deploy Credential Stuffing Detection</h4>
          <p>Actively detect and block automated credential-stuffing attacks targeting your login portals. Attackers use massive botnets to test thousands of credential pairs per minute, and your defenses must identify and block this behavior in real-time.</p>
          <ul>
            <li>Deploy rate limiting and account lockout policies with progressive delays to slow automated testing</li>
            <li>Implement bot detection using CAPTCHA challenges, behavioral analysis, and device fingerprinting technologies</li>
            <li>Monitor for anomalous authentication patterns: high-volume failures, distributed login attempts, unusual user-agent strings</li>
            <li>Use WAF rules and API gateway protections to detect and block credential-stuffing tool signatures</li>
          </ul>
        </div>
      </div>

      <!-- Step 6 -->
      <div class="step-card">
        <div class="step-num">06</div>
        <div class="step-content">
          <h4>Secure Session Management and Cookies</h4>
          <p>Credentials extend beyond passwords to include session tokens, cookies, and API keys. Adversaries who steal active session tokens can bypass authentication entirely, making session security a critical component of credential defense.</p>
          <ul>
            <li>Implement HTTPOnly, Secure, and SameSite flags on all authentication cookies to prevent XSS and CSRF exploitation</li>
            <li>Use short-lived session tokens with automatic rotation and secure refresh token mechanisms</li>
            <li>Bind sessions to device fingerprints and IP ranges to detect and invalidate hijacked sessions</li>
            <li>Audit all API endpoints for exposed authentication credentials, hardcoded keys, and insecure token storage</li>
          </ul>
        </div>
      </div>

      <!-- Step 7 -->
      <div class="step-card">
        <div class="step-num">07</div>
        <div class="step-content">
          <h4>Establish a Password Lifecycle Management Program</h4>
          <p>Create a comprehensive program that manages credentials from creation through retirement, including onboarding provisioning, ongoing monitoring, and secure deprovisioning when employees leave or change roles.</p>
          <ul>
            <li>Implement automated provisioning and deprovisioning integrated with HR systems (SCIM-based identity lifecycle)</li>
            <li>Run continuous credential exposure monitoring with automated remediation workflows and escalation procedures</li>
            <li>Conduct regular purple team exercises simulating credential-based attack scenarios to validate defenses</li>
            <li>Maintain a credential incident response playbook with defined roles, communication templates, and recovery procedures</li>
          </ul>
        </div>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 6: COMMON MISTAKES &amp; BEST PRACTICES ======== -->
<section id="mistakes" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 06</div>
      <h2>Common Mistakes &amp; Best Practices</h2>
      <div class="divider"></div>
    </div>

    <div class="mb-grid">
      <!-- Mistakes -->
      <div class="glass-card mb-card mistake">
        <h3>&#10060; Common Mistakes</h3>
        <ul>
          <li><strong class="text-red">Relying solely on password complexity requirements</strong> without monitoring for breaches, complex passwords that have been leaked are just as dangerous as simple ones, and attackers don't care about your complexity policy when they already have the plaintext from a breach database.</li>
          <li><strong class="text-red">Implementing MFA only on select services</strong> while leaving VPNs, legacy applications, or internal portals unprotected, attackers will find and exploit the weakest link in your authentication chain, making partial MFA deployment effectively useless against determined adversaries.</li>
          <li><strong class="text-red">Ignoring third-party and shadow IT credential exposure</strong>, employees use unauthorized SaaS applications, personal email for work tasks, and shared credentials across teams, all of which create blind spots that credential monitoring must address but often doesn't.</li>
          <li><strong class="text-red">Using SMS-based MFA as the primary second factor</strong> despite well-documented SIM-swapping attacks that allow adversaries to intercept SMS codes and bypass authentication entirely, rendering the MFA investment ineffective.</li>
          <li><strong class="text-red">Failing to revoke credentials promptly when employees depart</strong> or change roles, orphaned accounts with active credentials remain in Active Directory, cloud platforms, and SaaS applications for months or years after the employee leaves, creating persistent backdoors.</li>
        </ul>
      </div>

      <!-- Best Practices -->
      <div class="glass-card mb-card best">
        <h3>&#10003; Best Practices</h3>
        <ul>
          <li><strong class="text-green">Deploy continuous breach monitoring</strong> across all corporate domains, employee email addresses, and known credential pairs, integrate automated APIs from HIBP, SpyCloud, or Recorded Future into your SIEM for real-time alerting and immediate remediation workflows.</li>
          <li><strong class="text-green">Enforce phishing-resistant MFA universally</strong> using FIDO2 hardware security keys for all privileged accounts and push-based authenticator apps for standard users, eliminating SMS entirely and requiring MFA on 100% of systems including legacy applications.</li>
          <li><strong class="text-green">Implement zero-trust architecture</strong> with continuous verification of every access request regardless of network location, combining device health checks, behavioral analytics, and risk scoring to make credential-based lateral movement significantly harder.</li>
          <li><strong class="text-green">Automate credential lifecycle management</strong> with HR-integrated provisioning and deprovisioning, automated password rotation for service accounts and API keys, and real-time orphaned account detection to eliminate credential-related blind spots.</li>
          <li><strong class="text-green">Conduct regular credential security assessments</strong> including credential-stuffing simulations, breach exposure audits, MFA coverage reviews, and purple team exercises that specifically test your organization's resilience against T1589.001-style credential gathering and exploitation.</li>
        </ul>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 7: RED TEAM vs BLUE TEAM ======== -->
<section id="teams" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 07</div>
      <h2>Red Team vs Blue Team View</h2>
      <div class="divider"></div>
    </div>

    <div class="team-grid">
      <!-- Red Team -->
      <div class="glass-card team-card red">
        <span class="team-label">&#9760; RED TEAM</span>
        <h3>Offensive Perspective</h3>
        <p>
          From the red team's perspective, T1589.001 is often the path of least resistance into a target organization. Rather than investing in zero-day exploitation or complex social engineering campaigns, credential gathering provides a high-probability, low-cost initial access vector that blends in with legitimate user behavior. The red team begins by identifying the target's credential attack surface: corporate email formats, SaaS application footprints, VPN endpoints, and web-facing authentication portals. Using OSINT techniques, they correlate employee names from LinkedIn with corporate email patterns to build target lists. They then query breach databases and dark web marketplaces for matching credential pairs, prioritizing recent breaches and financial services employees whose credentials command premium prices. The subsequent credential-stuffing campaign is executed using distributed infrastructure to avoid rate-limiting and IP-based detection, with automated tools testing hundreds of credential pairs per minute across every identified authentication endpoint. Successful authentications are immediately catalogued and used to establish persistent access through VPN sessions, OAuth token theft, and browser cookie extraction, creating a foothold that is nearly indistinguishable from legitimate user activity and extremely difficult for defenders to detect through conventional monitoring.
        </p>
        <p class="mt-1">
          <span class="tool-tag">Credential Stuffing</span>
          <span class="tool-tag">Dark Web Markets</span>
          <span class="tool-tag">Breached DBs</span>
          <span class="tool-tag">Phishing Kits</span>
          <span class="tool-tag">Session Hijacking</span>
        </p>
      </div>

      <!-- Blue Team -->
      <div class="glass-card team-card blue">
        <span class="team-label">&#128737; BLUE TEAM</span>
        <h3>Defensive Perspective</h3>
        <p>
          The blue team's approach to defending against T1589.001 must be layered and proactive, recognizing that credential exposure is effectively inevitable in the modern threat landscape. The defensive strategy operates across three pillars: prevention, detection, and response. Prevention focuses on reducing the attack surface by enforcing MFA on every authentication endpoint, deploying enterprise password managers to eliminate password reuse, and implementing conditional access policies that evaluate login context beyond the credential itself. Detection requires monitoring for the indicators of credential-based attacks: abnormal authentication volumes from distributed IP ranges, impossible travel patterns, unusual user-agent strings associated with known credential-stuffing tools, and authentication failures followed by unexpected successes. Integration with breach notification services enables the blue team to proactively identify when organizational credentials have been exposed and force password resets before attackers can exploit them. Response protocols must include automated credential revocation workflows, session termination procedures, and forensic investigation capabilities to determine the scope of any successful credential-based compromise. The blue team must also advocate for organizational culture change around password practices, recognizing that technical controls alone are insufficient without employee awareness and buy-in.
        </p>
        <p class="mt-1">
          <span class="tool-tag">SIEM Monitoring</span>
          <span class="tool-tag">MFA Enforcement</span>
          <span class="tool-tag">Breach APIs</span>
          <span class="tool-tag">IAM Policies</span>
          <span class="tool-tag">WAF Rules</span>
        </p>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 8: THREAT HUNTER'S EYE ======== -->
<section id="hunter" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 08</div>
      <h2>Threat Hunter's Eye</h2>
      <div class="divider"></div>
    </div>

    <div class="hunter-card">
      <h3>&#128065; Hunting for Credential Gathering Indicators</h3>
      <p>
        Threat hunters investigating potential T1589.001 activity should focus on behavioral patterns that distinguish legitimate user authentication from credential-based attacks. The primary hypothesis to test is: "An adversary is testing known breached credentials against our authentication infrastructure." This requires analyzing authentication logs across all systems for statistical anomalies that indicate automated testing rather than human behavior, and correlating these findings with known breach databases to confirm that the credentials being tested have been previously exposed.
      </p>

      <div class="accent-line"></div>

      <h4 class="text-purple mb-1">&#128270; Key Hunt Queries</h4>

      <div class="glass-card">
        <p class="mono" style="font-size:.75rem;color:#00f0ff">
          // Query 1: High-volume authentication failures from distributed IPs<br>
          index=auth sourcetype=oauth OR vpn OR web<br>
          | stats count dc(src_ip) by user<br>
          | where count &gt; 20 AND dc(src_ip) &gt; 5<br>
          | sort -count
        </p>
      </div>

      <div class="glass-card">
        <p class="mono" style="font-size:.75rem;color:#00f0ff">
          // Query 2: Authentication from known-malicious IPs after breach publication<br>
          index=auth action=failure<br>
          | lookup threat_intel_ip.csv src_ip OUTPUT is_malicious, threat_actor<br>
          | where is_malicious=true<br>
          | stats count by user, src_ip, threat_actor<br>
          | join user [inputlookup breached_credentials.csv]
        </p>
      </div>

      <div class="glass-card">
        <p class="mono" style="font-size:.75rem;color:#00f0ff">
          // Query 3: Impossible travel, success from two geographies within 30min<br>
          index=auth action=success<br>
          | streamstats time_window=30m max(_time) as max_t min(_time) as min_t by user<br>
          | eval travel_delta=max_t - min_t<br>
          | eval geo_distance=geo_distance(src_geo, prev_geo)<br>
          | where travel_delta &lt; 1800 AND geo_distance &gt; 500<br>
          | table user, src_ip, src_geo, _time
        </p>
      </div>

      <div class="accent-line"></div>

      <h4 class="text-purple mb-1">&#128200; Detection Opportunities</h4>
      <div class="stat-grid" style="grid-template-columns:repeat(auto-fit,minmax(250px,1fr))">
        <div class="glass-card" style="border-left:3px solid #8b5cf6">
          <h4 style="font-size:.9rem;color:#8b5cf6">Authentication Anomalies</h4>
          <p style="font-size:.85rem">Monitor for burst patterns of authentication failures (10+ failures per minute from a single user), distributed authentication attempts from geographically dispersed IPs within short time windows, and credential-stuffing tool signatures in user-agent strings such as known bot libraries and headless browser identifiers.</p>
        </div>
        <div class="glass-card" style="border-left:3px solid #ff4444">
          <h4 style="font-size:.9rem;color:#ff4444">Breach Correlation</h4>
          <p style="font-size:.85rem">Cross-reference all authentication events with known breach databases. When a user authenticates successfully with a credential that appeared in a breach published within the last 90 days, flag the event as high-priority for investigation regardless of whether MFA was involved, as it indicates the user has not changed their password post-breach.</p>
        </div>
        <div class="glass-card" style="border-left:3px solid #00f0ff">
          <h4 style="font-size:.9rem;color:#00f0ff">Behavioral Baseline Deviations</h4>
          <p style="font-size:.85rem">Establish per-user authentication baselines including typical login times, geographic locations, device types, and access patterns. Deviations from established baselines, particularly first-time authentications from new devices or locations combined with previously seen credentials, should trigger stepped-up verification requirements.</p>
        </div>
      </div>
    </div>
  </div>
</section>

<!-- ======== SECTION 9: CALL-TO-ACTION ======== -->
<section id="cta" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 09</div>
      <h2>Continue Exploring</h2>
      <div class="divider"></div>
    </div>

    <div class="cta-section">
      <div class="cta-box">
        <h2>&#128274; Credential Security is Everyone's Responsibility</h2>
        <p>
          T1589.001 represents one of the most prevalent and impactful sub-techniques in the MITRE ATT&amp;CK framework. Whether you are a security analyst hunting for credential-based attacks, a blue team defender implementing proactive monitoring, or a red team operator testing your organization's resilience, understanding how adversaries gather and exploit credentials is essential to building an effective defense posture. The statistics are clear: stolen credentials are the number one initial access vector, and the 16-billion-record breach of 2025 has made credential-based attacks easier and more scalable than ever before. Take action today by auditing your organization's credential exposure, implementing the seven-step defense guide outlined above, and fostering a culture of password hygiene that makes credential-based attacks significantly harder to execute.
        </p>
        <p class="text-muted" style="font-size:.8rem">Explore related techniques in the Gather Victim Identity Information family:</p>

        <div class="subtech-links">
          <a href="T1589_Gather_Victim_Identity_Information.html">
            &#9654; T1589, Gather Victim Identity Information
          </a>
          <a href="T1589.002_Email_Addresses.html">
            &#9654; T1589.002, Email Addresses
          </a>
          <a href="T1589.003_Employee_Names.html">
            &#9654; T1589.003, Employee Names
          </a>
        </div>
      </div>
    </div>
  </div>
</section>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-eb8710d e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="eb8710d" data-element_type="container">
				<div class="elementor-element elementor-element-04975bd elementor-widget elementor-widget-html" data-id="04975bd" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					
    <div class="attack-card">
        <!-- header with main technique context -->
        <div class="technique-header" style="text-align: center">
            <h2><i class="fas fa-radar" style="font-size: 1.2rem;margin-right: 8px;color: #2de0c0"></i>Credentials</h2>
        </div>
        <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 10px 0">

        <!-- MITIGATIONS section (pre-compromise) -->
        <div style="margin-bottom: 1.5rem">
            <div class="section-title">
                <i class="fas fa-shield-virus"></i> MITIGATIONS
            </div>
            <div class="mitigation-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Pre-compromise</span>
                    <span class="small-tag" style="text-align: center">M1056</span>
                </a>
            </div>
        </div>

        <!-- DETECTION section -->
        <div style="margin-bottom: 1rem">
            <div class="section-title">
                <i class="fas fa-eye"></i> DETECTION STRATEGY
            </div>
            <div class="detection-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Detection of Hardware</span>
                    <span class="small-tag" style="text-align: center">DET0887</span>
                </a>
            </div>
        </div>
    </div>
    
        <!-- ========== END OF PAGE – DONATION BOX : BRIEF, DIRECT, HONEST ========== -->
    <div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
		<div data-wpr-particles="{&quot;particles&quot;:{&quot;number&quot;:{&quot;value&quot;:400,&quot;density&quot;:{&quot;enable&quot;:true,&quot;value_area&quot;:800}},&quot;color&quot;:{&quot;value&quot;:&quot;#000000&quot;},&quot;shape&quot;:{&quot;type&quot;:&quot;circle&quot;,&quot;stroke&quot;:{&quot;width&quot;:0,&quot;color&quot;:&quot;#000000&quot;},&quot;polygon&quot;:{&quot;nb_sides&quot;:5},&quot;image&quot;:{&quot;src&quot;:&quot;img/github.svg&quot;,&quot;width&quot;:100,&quot;height&quot;:100}},&quot;opacity&quot;:{&quot;value&quot;:0.5,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:1,&quot;opacity_min&quot;:0.1,&quot;sync&quot;:false}},&quot;size&quot;:{&quot;value&quot;:10,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:40,&quot;size_min&quot;:0.1,&quot;sync&quot;:false}},&quot;line_linked&quot;:{&quot;enable&quot;:false,&quot;distance&quot;:500,&quot;color&quot;:&quot;#000000&quot;,&quot;opacity&quot;:0.4,&quot;width&quot;:2},&quot;move&quot;:{&quot;enable&quot;:true,&quot;speed&quot;:6,&quot;direction&quot;:&quot;bottom&quot;,&quot;random&quot;:false,&quot;straight&quot;:false,&quot;out_mode&quot;:&quot;out&quot;,&quot;bounce&quot;:false,&quot;attract&quot;:{&quot;enable&quot;:false,&quot;rotateX&quot;:600,&quot;rotateY&quot;:1200}}},&quot;interactivity&quot;:{&quot;detect_on&quot;:&quot;window&quot;,&quot;events&quot;:{&quot;onhover&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;bubble&quot;},&quot;onclick&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;repulse&quot;},&quot;resize&quot;:true},&quot;modes&quot;:{&quot;grab&quot;:{&quot;distance&quot;:400,&quot;line_linked&quot;:{&quot;opacity&quot;:0.5}},&quot;bubble&quot;:{&quot;distance&quot;:400,&quot;size&quot;:4,&quot;duration&quot;:0.3,&quot;opacity&quot;:1,&quot;speed&quot;:3},&quot;repulse&quot;:{&quot;distance&quot;:200,&quot;duration&quot;:0.4},&quot;push&quot;:{&quot;particles_nb&quot;:4},&quot;remove&quot;:{&quot;particles_nb&quot;:2}}},&quot;retina_detect&quot;:true}" particle-source="wpr_particle_json" wpr-quantity="100" wpr-color="#FFFFFF" wpr-speed="3" wpr-shape="circle" wpr-size="4" class="elementor-element elementor-element-c6268b8 e-con-full wpr-particle-yes e-flex wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="c6268b8" data-element_type="container">
				<div class="elementor-element elementor-element-d18702a elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="d18702a" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-9fe5851 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="9fe5851" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-d7a2ff9 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info" data-id="d7a2ff9" data-element_type="widget" data-widget_type="wpr-post-info.default">
				<div class="elementor-widget-container">
					<ul class="wpr-post-info wpr-post-info-horizontal"><li class="wpr-post-info-author"><span class="wpr-post-info-text"><i aria-hidden="true" class="far fa-copyright"></i></span><span>Cyber Pulse Academy</span></li><li class="wpr-post-info-date"><span>February 13, 2026</span></li><li class="wpr-post-info-comments"><span>  No Comments</span></li></ul>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-b2d04bf e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="b2d04bf" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-c5b71c2 wpr-comment-reply-separate wpr-comment-reply-align-right elementor-widget elementor-widget-wpr-post-comments" data-id="c5b71c2" data-element_type="widget" data-widget_type="wpr-post-comments.default">
				<div class="elementor-widget-container">
					<div class="wpr-comments-wrap" id="comments">	<div id="respond" class="comment-respond">
		<h3 id="wpr-reply-title" class="wpr-comment-reply-title">Leave a Comment <small><a rel="nofollow" id="cancel-comment-reply-link" href="/tag/t1589/feed/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://www.cyberpulseacademy.com/comments/" method="post" id="wpr-comment-form" class="wpr-comment-form wpr-cf-style-6 wpr-cf-no-url" novalidate><p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p><div class="wpr-comment-form-text"><textarea name="comment" placeholder="Message*" cols="45" rows="8" maxlength="65525"></textarea></div><div class="wpr-comment-form-fields"> <div class="wpr-comment-form-author"><input type="text" name="author" placeholder="Name*"/></div>
<div class="wpr-comment-form-email"><input type="text" name="email" placeholder="Email*"/></div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="wpr-submit-comment" class="wpr-submit-comment" value="Submit" /> <input type='hidden' name='comment_post_ID' value='12566' id='comment_post_ID' />
<input type='hidden' name='comment_parent' id='comment_parent' value='0' />
</p><p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="568fa9a0a1" /></p><br /><div  class='g-recaptcha lz-recaptcha' data-sitekey='6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' data-theme='light' data-size='normal'></div>
<noscript>
	<div style='width: 302px; height: 352px;'>
		<div style='width: 302px; height: 352px; position: relative;'>
			<div style='width: 302px; height: 352px; position: absolute;'>
				<iframe src='https://www.google.com/recaptcha/api/fallback?k=6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' frameborder='0' scrolling='no' style='width: 302px; height:352px; border-style: none;'>
				</iframe>
			</div>
			<div style='width: 250px; height: 80px; position: absolute; border-style: none; bottom: 21px; left: 25px; margin: 0px; padding: 0px; right: 25px;'>
				<textarea name='g-recaptcha-response' class='g-recaptcha-response' style='width: 250px; height: 80px; border: 1px solid #c1c1c1; margin: 0px; padding: 0px; resize: none;' value=''>
				</textarea>
			</div>
		</div>
	</div>
</noscript><br><p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="243"/><script>document.getElementById( "ak_js_2" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>	</div><!-- #respond -->
	</div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-71d08ce e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="71d08ce" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4838a78 wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="4838a78" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.cyberpulseacademy.com/credentials-t1589-001/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gather Victim Identity Information &#8211; T1589</title>
		<link>https://www.cyberpulseacademy.com/gather-victim-identity-information-t1589/</link>
					<comments>https://www.cyberpulseacademy.com/gather-victim-identity-information-t1589/#respond</comments>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 02:24:17 +0000</pubDate>
				<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[Reconnaissance]]></category>
		<category><![CDATA[T1589]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=12559</guid>

					<description><![CDATA[Learn how Gather Victim Identity Information works with real-world examples. Discover detection queries &#38; mitigation steps. Your practical MITRE ATT&#38;CK field guide.]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="12559" class="elementor elementor-12559" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-a109d13 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="a109d13" data-element_type="container">
		<div class="elementor-element elementor-element-278c132 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="278c132" data-element_type="container">
				<div class="elementor-element elementor-element-1b959a4 elementor-widget elementor-widget-template" data-id="1b959a4" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="12458" class="elementor elementor-12458" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-9179ea0 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="9179ea0" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-36e1638 elementor-widget elementor-widget-html" data-id="36e1638" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<!-- Floating Particles -->
<div class="particles" aria-hidden="true">
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
  <div class="particle"></div><div class="particle"></div><div class="particle"></div>
</div>

<!-- ======== HERO / SIMULATION ======== -->
<header class="hero" id="simulation">
  <div class="hero-bg" aria-hidden="true"></div>
  <div class="grid-lines" aria-hidden="true"></div>

  <div class="sim-wrapper">
    <div class="hero-title">
      <span class="tag">T1589 ,  Reconnaissance</span>
      <h1>Gather Victim Identity Information</h1>
      <div class="subtitle">Adversaries harvest personal data from LinkedIn, corporate sites, social media, data leaks, WHOIS records, and dark web markets to assemble complete victim profiles...</div>
    </div>

    <!-- Identity Gathering Simulation -->
    <div class="identity-sim" aria-label="Animated CSS-only identity information gathering simulation">

      <!-- Pulse Rings -->
      <div class="pulse-ring" aria-hidden="true"></div>
      <div class="pulse-ring" aria-hidden="true"></div>
      <div class="pulse-ring" aria-hidden="true"></div>

      <!-- Scan Rings -->
      <div class="scan-ring" aria-hidden="true"></div>
      <div class="scan-ring" aria-hidden="true"></div>
      <div class="scan-ring" aria-hidden="true"></div>

      <!-- Orbit Dots -->
      <div class="orbit-dot" aria-hidden="true"></div>
      <div class="orbit-dot" aria-hidden="true"></div>
      <div class="orbit-dot" aria-hidden="true"></div>

      <!-- Connection Lines (digital footprint web) -->
      <div class="conn-lines" aria-hidden="true">
        <div class="conn-line"></div>
        <div class="conn-line"></div>
        <div class="conn-line"></div>
        <div class="conn-line"></div>
        <div class="conn-line"></div>
        <div class="conn-line"></div>
      </div>

      <!-- Floating text fragments -->
      <div class="frag-float" style="top:120px;left:160px">john.doe@corp.com</div>
      <div class="frag-float" style="top:180px;right:180px">+1 (555) 0123</div>
      <div class="frag-float" style="bottom:150px;left:200px">Password123!</div>
      <div class="frag-float" style="bottom:120px;right:200px">123 Main St</div>
      <div class="frag-float" style="top:90px;left:50%">VP of Engineering</div>
      <div class="frag-float" style="top:250px;left:120px">DOB: 1985-03-14</div>

      <!-- Data Fragments -->
      <!-- LinkedIn Fragment -->
      <div class="fragment frag-linkedin">
        <span class="frag-icon">&#128101;</span>
        <span class="frag-type">LINKEDIN</span>
        <span class="frag-data">Name, Job, Company</span>
      </div>

      <!-- Corporate Website Fragment -->
      <div class="fragment frag-corporate">
        <span class="frag-icon">&#127970;</span>
        <span class="frag-type">CORP WEBSITE</span>
        <span class="frag-data">Role, Bio, Email</span>
      </div>

      <!-- Social Media Fragment -->
      <div class="fragment frag-social">
        <span class="frag-icon">&#127760;</span>
        <span class="frag-type">SOCIAL MEDIA</span>
        <span class="frag-data">Interests, Location</span>
      </div>

      <!-- Data Leaks Fragment -->
      <div class="fragment frag-leaks">
        <span class="frag-icon">&#128272;</span>
        <span class="frag-type">DATA LEAKS</span>
        <span class="frag-data">Credentials, PII</span>
      </div>

      <!-- WHOIS Fragment -->
      <div class="fragment frag-whois">
        <span class="frag-icon">&#127760;</span>
        <span class="frag-type">WHOIS</span>
        <span class="frag-data">Domain, Registrar</span>
      </div>

      <!-- Dark Web Fragment -->
      <div class="fragment frag-darkweb">
        <span class="frag-icon">&#128274;</span>
        <span class="frag-type">DARK WEB</span>
        <span class="frag-data">Stolen Data, Dumps</span>
      </div>

      <!-- Central Profile Card -->
      <div class="profile-card-center">
        <div class="profile-avatar">&#128100;</div>
        <div class="profile-name">VICTIM PROFILE</div>
        <div class="profile-role">ASSEMBLED IDENTITY</div>
        <div class="profile-status">COMPROMISED</div>
      </div>

      <!-- Data Panel -->
      <div class="data-panel">
        <div class="dp-title">// ASSEMBLED PROFILE</div>
        <div class="dp-row"><span class="dp-key">NAME</span><span class="dp-val">John A. Doe</span></div>
        <div class="dp-row"><span class="dp-key">EMAIL</span><span class="dp-val">j.doe@nova.com</span></div>
        <div class="dp-row"><span class="dp-key">CRED</span><span class="dp-val">Hunter2!2024</span></div>
        <div class="dp-row"><span class="dp-key">PHONE</span><span class="dp-val">+1-555-0147</span></div>
        <div class="dp-row"><span class="dp-key">ADDR</span><span class="dp-val">123 Oak Ave, SF</span></div>
        <div class="dp-row"><span class="dp-key">TITLE</span><span class="dp-val">VP Engineering</span></div>
      </div>

      <!-- Threat Level Meter -->
      <div class="threat-meter">
        <div class="meter-label">
          <span>THREAT LEVEL</span>
          <span class="meter-value">&#9888; ASSEMBLING</span>
        </div>
        <div class="meter-bar">
          <div class="meter-fill"></div>
        </div>
        <div class="meter-ticks">
          <span>LOW</span><span>MED</span><span>HIGH</span><span>CRITICAL</span>
        </div>
      </div>
    </div>

    <!-- Status Indicators -->
    <div class="status-bar" aria-label="Identity gathering status">
      <div class="status-indicator">
        <span class="status-dot"></span>
        LINKEDIN
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        CORP WEBSITE
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        DATA LEAKS
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        DARK WEB
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        WHOIS
      </div>
      <div class="status-indicator">
        <span class="status-dot"></span>
        SOCIAL MEDIA
      </div>
    </div>
  </div>
</header>

<!-- ======== SECTION 2: WHY IT MATTERS ======== -->
<section id="why" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 02</div>
      <h2>Why Gather Victim Identity Information Matters</h2>
      <div class="divider"></div>
    </div>

    <div class="glass-card">
      <p>
        <strong class="text-purple">Gather Victim Identity Information</strong> is the reconnaissance technique where adversaries collect personal details about individuals within a target organization ,  names, emails, credentials, phone numbers, security questions, MFA configurations, and even behavioral patterns. This technique (T1589 in the MITRE ATT&amp;CK framework) sits within the Reconnaissance tactic and serves as the critical intelligence-gathering phase that powers social engineering attacks, spear-phishing campaigns, credential stuffing, business email compromise (BEC), and targeted impersonation. Unlike technical reconnaissance focused on infrastructure, identity reconnaissance exploits the human element ,  studying people, their roles, their relationships, and their digital footprints to craft highly convincing attacks that bypass technical controls by manipulating trust.
      </p>
      <br>
      <p>
        The danger of T1589 lies in its accessibility and scale. Open-source intelligence (OSINT) tools make it trivial to harvest employee data from LinkedIn, corporate websites, social media platforms, data broker services, and breached credential databases. Adversaries cross-reference information from multiple sources to build comprehensive victim dossiers that enable precision-targeted attacks. A threat actor who knows an employee's name, job title, manager's name, recent project, and personal interests can craft a phishing email that is virtually indistinguishable from legitimate internal communication, achieving success rates far above generic campaigns.
      </p>
    </div>

    <div class="stat-grid">
      <div class="stat-box">
        <div class="stat-number">60%</div>
        <div class="stat-label">Identity-based attacks of all<br>cyber incidents in 2024<br><span class="text-muted mono" style="font-size:.65rem">(Source: SANS)</span></div>
      </div>
      <div class="stat-box">
        <div class="stat-number red">$4.9M</div>
        <div class="stat-label">Global avg. data breach<br>cost in 2024 (+10%)<br><span class="text-muted mono" style="font-size:.65rem">(Source: Huntress)</span></div>
      </div>
      <div class="stat-box">
        <div class="stat-number" style="color:#f0a500">95%</div>
        <div class="stat-label">Data breaches caused<br>by the human element<br><span class="text-muted mono" style="font-size:.65rem">(Source: IBM/Huntress)</span></div>
      </div>
      <div class="stat-box">
        <div class="stat-number cyan">3,322</div>
        <div class="stat-label">Data compromises in 2025<br>(+5 percentage points)<br><span class="text-muted mono" style="font-size:.65rem">(Source: ITRC 2025)</span></div>
      </div>
      <div class="stat-box">
        <div class="stat-number" style="color:#ff4444">16%</div>
        <div class="stat-label">Breaches involving AI;<br>37% for AI phishing<br><span class="text-muted mono" style="font-size:.65rem">(Source: IBM 2025)</span></div>
      </div>
    </div>

    <div class="ref-links">
      <a href="https://attack.mitre.org/techniques/T1589" rel="dofollow noopener" target="_blank">MITRE ATT&amp;CK T1589</a>
      <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/malware-phishing-and-ransomware" rel="dofollow noopener" target="_blank">CISA Threat Advisories</a>
      <a href="https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-crime-report" rel="dofollow noopener" target="_blank">FBI IC3 Report</a>
      <a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf" rel="dofollow noopener" target="_blank">NIST SP 800-61r2</a>
      <a href="https://www.sans.org/blog/identity-based-attacks-evolution-social-engineering-zero-trust-attack-vectors" rel="dofollow noopener" target="_blank">SANS: Identity-Based Attacks</a>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 3: KEY TERMS &amp; CONCEPTS ======== -->
<section id="concepts" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 03</div>
      <h2>Key Terms &amp; Concepts</h2>
      <div class="divider"></div>
    </div>

    <div class="def-box">
      <div class="def-label">Simple Definition</div>
      <p>
        <strong class="text-purple">Gather Victim Identity Information (T1589)</strong> is a MITRE ATT&amp;CK reconnaissance technique where adversaries systematically collect personal data about individuals associated with a target organization. This includes employee names, email addresses, usernames, credentials, phone numbers, job titles, organizational roles, and security question responses. This intelligence fuels social engineering attacks, phishing campaigns, credential stuffing, and targeted impersonation. The technique encompasses three sub-techniques ,  T1589.001 (Credentials), T1589.002 (Email Addresses), and T1589.003 (Employee Names) ,  each targeting a specific category of personally identifiable information that attackers can leverage to compromise accounts, deceive employees, or impersonate trusted individuals within the organization.
      </p>
    </div>

    <div class="analogy-box">
      <div class="def-label">Everyday Analogy</div>
      <p>
        Imagine a con artist who wants to scam a company. Before making any contact, they spend weeks learning everything about the CEO ,  where they went to school, who their golf buddies are, what conferences they attend, what their assistant's name is, and even what their dog is called. Armed with all these personal details, they can craft an email that sounds exactly like someone the CEO trusts. That's what T1589 does at digital scale. Adversaries use LinkedIn to learn job titles and reporting structures, social media to discover personal interests and travel plans, data breach databases to find reused passwords, corporate websites to map organizational hierarchies, and WHOIS records to connect employees to domain registrations. The more information an attacker gathers, the more convincing their impersonation becomes ,  and the harder it is for victims to detect the deception.
      </p>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 4: REAL-WORLD SCENARIO ======== -->
<section id="scenario" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 04</div>
      <h2>Real-World Scenario</h2>
      <div class="divider"></div>
    </div>

    <div class="glow-card">
      <h3>&#128100; NovaTech Solutions ,  A $3.2M Identity-Driven Attack</h3>
      <p>
        <strong class="text-purple">Target:</strong> NovaTech Solutions, a technology consulting firm with 800 employees.<br>
        <strong class="text-purple">Key Figure:</strong> Rachel Kim, Chief Information Security Officer (CISO), tasked with protecting the organization's digital assets and employee data.
      </p>

      <div class="scenario-timeline">
        <div class="timeline-item bad">
          <h4>&#9888; Before: The Breach</h4>
          <p>
            NovaTech employees freely shared personal information on LinkedIn ,  job titles, departments, reporting chains, and even project details were publicly visible. Corporate directories were publicly accessible through the company website, listing full names, email addresses, phone numbers, and office locations. The company used predictable email formats (firstname.lastname@novatech.com), making it trivial for attackers to guess any employee's email address. A sophisticated threat actor spent 3 weeks profiling 50 key employees using OSINT ,  gathering names, roles, email addresses, personal interests, upcoming travel plans from social media posts, and even vacation schedules from out-of-office auto-replies. They cross-referenced breached credential databases and found that 12 employees had reused passwords across personal and work accounts. Armed with this comprehensive intelligence, the attackers launched a targeted spear-phishing campaign impersonating the CFO, crafting an urgent email about a time-sensitive acquisition deal that tricked an accounts payable clerk into wiring <strong class="text-red">$3.2 million</strong> to an overseas account. By the time the fraud was discovered three days later during a routine reconciliation, the money had been dispersed through multiple shell companies and was unrecoverable.
          </p>
        </div>

        <div class="timeline-item good">
          <h4>&#10003; After: Rachel Kim's Response</h4>
          <p>
            Rachel implemented a comprehensive identity exposure reduction program across the organization. Corporate directory access was restricted to authenticated internal users only, and public-facing staff listings were removed from the website. She launched mandatory LinkedIn training for all employees, teaching them to limit profile visibility and avoid sharing sensitive organizational details. Email format conventions were randomized for external communications using an alias system, making it significantly harder for attackers to predict email addresses. The company deployed a robust security awareness program featuring quarterly phishing simulations with realistic, personalized phishing tests. Rachel implemented DMARC, DKIM, and SPF email authentication protocols to prevent domain spoofing and impersonation. Most critically, she established a mandatory out-of-band verification process for all wire transfers exceeding $10,000, requiring phone confirmation using pre-registered numbers ,  not contact information from the email requesting the transfer. Within six months, simulated phishing click rates dropped from 34% to 4%, and zero financial fraud incidents were reported in the following year.
          </p>
        </div>
      </div>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 5: STEP-BY-STEP GUIDE ======== -->
<section id="guide" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 05</div>
      <h2>Step-by-Step Defense Guide</h2>
      <div class="divider"></div>
    </div>

    <div class="steps-grid">
      <div class="step-card">
        <div class="step-num">01</div>
        <div class="step-content">
          <h4>Conduct an Identity Exposure Audit</h4>
          <p>Map your organization's digital footprint to understand what information is publicly accessible about your employees.</p>
          <ul>
            <li>Search LinkedIn, corporate websites, and data broker services for employee names, titles, and contact details</li>
            <li>Check breached credential databases (Have I Been Pwned, DeHashed) for employee email addresses and passwords</li>
            <li>Review WHOIS records for domain registrations that may expose employee names and contact information</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">02</div>
        <div class="step-content">
          <h4>Secure Corporate Directory and Public-Facing Information</h4>
          <p>Restrict access to internal directories and minimize the personal information available on public-facing platforms.</p>
          <ul>
            <li>Move corporate directories behind authentication walls; remove public staff listing pages from your website</li>
            <li>Implement role-based access controls (RBAC) for internal directory services and limit search capabilities</li>
            <li>Review and sanitize all public documents, press releases, and conference bios that reveal employee details</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">03</div>
        <div class="step-content">
          <h4>Implement Email Authentication (DMARC/DKIM/SPF)</h4>
          <p>Prevent adversaries from impersonating your domain and employees in phishing campaigns targeting your organization or partners.</p>
          <ul>
            <li>Deploy DMARC in enforcement mode (p=reject) to block unauthorized use of your email domain</li>
            <li>Configure DKIM signing for all outbound email to enable cryptographic verification of message authenticity</li>
            <li>Implement SPF records with strict alignment to limit which mail servers can send on behalf of your domain</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">04</div>
        <div class="step-content">
          <h4>Train Employees on Personal Information Sharing</h4>
          <p>Build a security-aware culture where employees understand the risks of oversharing personal and professional details online.</p>
          <ul>
            <li>Conduct mandatory training on LinkedIn privacy settings, social media risks, and digital footprint management</li>
            <li>Establish clear policies on what information can be shared publicly about job roles, projects, and organizational structure</li>
            <li>Run periodic social engineering assessments to identify employees who are most vulnerable to pretexting attacks</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">05</div>
        <div class="step-content">
          <h4>Deploy Social Engineering Detection</h4>
          <p>Implement technical controls and monitoring to detect and block social engineering attempts that leverage gathered identity information.</p>
          <ul>
            <li>Deploy AI-powered email security gateways that analyze message content for impersonation and urgency-based manipulation tactics</li>
            <li>Monitor for brand impersonation and domain spoofing using threat intelligence platforms and DMARC aggregate reports</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">06</div>
        <div class="step-content">
          <h4>Implement Out-of-Band Verification for Sensitive Transactions</h4>
          <p>Require secondary verification channels for high-risk actions to prevent fraud even when attackers successfully impersonate trusted individuals.</p>
          <ul>
            <li>Mandate phone verification using pre-registered numbers (not from the requesting email) for wire transfers exceeding defined thresholds</li>
            <li>Implement multi-party approval workflows for financial transactions, system changes, and data access requests</li>
            <li>Create escalation procedures for urgent requests that bypass normal channels, requiring direct manager or security team confirmation</li>
          </ul>
        </div>
      </div>

      <div class="step-card">
        <div class="step-num">07</div>
        <div class="step-content">
          <h4>Establish a Continuous Monitoring Program</h4>
          <p>Proactively monitor for leaked credentials, new data exposures, and emerging threats targeting your organization's employees.</p>
          <ul>
            <li>Subscribe to dark web monitoring services and credential breach notification systems to detect compromised employee accounts early</li>
            <li>Conduct quarterly OSINT assessments to discover new public exposures of employee identity information</li>
            <li>Maintain a threat intelligence feed focused on social engineering tactics, techniques, and procedures (TTPs) targeting your industry</li>
          </ul>
        </div>
      </div>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 6: COMMON MISTAKES &amp; BEST PRACTICES ======== -->
<section id="mistakes" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 06</div>
      <h2>Common Mistakes &amp; Best Practices</h2>
      <div class="divider"></div>
    </div>

    <div class="mb-grid">
      <div class="glow-card mb-card mistake">
        <span class="team-label" style="position:static;margin-bottom:.8rem;color:#ff4444;font-family:'Share Tech Mono',monospace;font-size:.65rem;letter-spacing:2px;text-transform:uppercase;padding:.2rem .6rem;border-radius:4px">COMMON MISTAKES</span>
        <ul>
          <li><strong class="text-red">Leaving corporate directories publicly accessible</strong> ,  Employee names, emails, phone numbers, and job titles displayed on the company website provide adversaries with a complete organizational map for targeted attacks.</li>
          <li><strong class="text-red">Ignoring LinkedIn as an intelligence source</strong> ,  Failing to train employees on LinkedIn privacy settings exposes organizational hierarchies, project details, reporting chains, and employee relationships.</li>
          <li><strong class="text-red">Using predictable email formats</strong> ,  Firstname.lastname@company.com conventions allow attackers to enumerate every employee email address and launch credential stuffing or phishing at scale.</li>
          <li><strong class="text-red">No DMARC enforcement</strong> ,  Operating without DMARC in reject mode (or at all) allows adversaries to spoof your domain in phishing emails targeting employees, partners, and customers.</li>
          <li><strong class="text-red">Relying solely on technical controls</strong> ,  Assuming that email filters and firewalls alone can prevent identity-based attacks while neglecting security awareness training and out-of-band verification procedures.</li>
        </ul>
      </div>

      <div class="glow-card mb-card best">
        <span class="team-label" style="position:static;margin-bottom:.8rem;color:#00ff41;font-family:'Share Tech Mono',monospace;font-size:.65rem;letter-spacing:2px;text-transform:uppercase;padding:.2rem .6rem;border-radius:4px">BEST PRACTICES</span>
        <ul>
          <li><strong class="text-green">Conduct regular identity exposure assessments</strong> ,  Perform quarterly OSINT audits to discover and remediate publicly available employee information before adversaries exploit it.</li>
          <li><strong class="text-green">Implement DMARC, DKIM, and SPF comprehensively</strong> ,  Deploy email authentication protocols in enforcement mode to prevent domain spoofing and make impersonation significantly harder.</li>
          <li><strong class="text-green">Train employees on digital footprint hygiene</strong> ,  Provide ongoing education about social media risks, LinkedIn privacy settings, and the dangers of sharing organizational details online.</li>
          <li><strong class="text-green">Enforce out-of-band verification for high-risk actions</strong> ,  Require secondary confirmation through pre-registered channels for financial transfers, credential changes, and sensitive data access.</li>
          <li><strong class="text-green">Monitor dark web and breach databases continuously</strong> ,  Subscribe to threat intelligence services that alert you when employee credentials or personal data appear in data breaches or underground markets.</li>
        </ul>
      </div>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 7: RED TEAM vs BLUE TEAM VIEW ======== -->
<section id="teams" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 07</div>
      <h2>Red Team vs Blue Team View</h2>
      <div class="divider"></div>
    </div>

    <div class="team-grid">
      <div class="glow-card team-card red">
        <span class="team-label">RED TEAM</span>
        <h3>&#128308; Attacker Perspective</h3>
        <p>
          For the red team, T1589 is the starting point for virtually every social engineering operation. The attacker's goal is to build the most comprehensive victim dossier possible with the least amount of effort. Red teamers begin with passive reconnaissance ,  harvesting employee names, titles, and email addresses from LinkedIn, the corporate website, and public directories. They then cross-reference this data with breached credential databases like Have I Been Pwned and DeHashed to find exposed passwords. Social media profiles on Twitter/X, Instagram, and Facebook reveal personal interests, travel schedules, family details, and even pet names commonly used as security question answers. WHOIS records connect employees to domain registrations, and dark web marketplaces provide access to stolen credentials, fullz (complete identity packages), and corporate data dumps. The red team uses this intelligence to craft hyper-personalized spear-phishing emails, pretexting scenarios for vishing (voice phishing) calls, and convincing BEC campaigns. The key metric is information density ,  how many unique data points can be collected per target employee to maximize the probability of a successful attack.
        </p>
        <div class="mt-2">
          <strong class="text-red mono" style="font-size:.75rem">TYPICAL OSINT TOOLS:</strong>
          <div class="mt-1">
            <span class="tool-tag">Maltego</span>
            <span class="tool-tag">theHarvester</span>
            <span class="tool-tag">Sherlock</span>
            <span class="tool-tag">SpiderFoot</span>
            <span class="tool-tag">Recon-ng</span>
            <span class="tool-tag">Holehe</span>
            <span class="tool-tag">Amass</span>
          </div>
        </div>
      </div>

      <div class="glow-card team-card blue">
        <span class="team-label">BLUE TEAM</span>
        <h3>&#128309; Defender Perspective</h3>
        <p>
          For the blue team, defending against T1589 requires a dual approach: reducing the information available to attackers (attack surface reduction) and detecting when adversaries are actively gathering intelligence about your organization (threat detection). Blue teamers must continuously audit the organization's public-facing digital footprint ,  scanning LinkedIn for employee profiles that reveal too much detail, checking corporate websites for exposed directories, monitoring data broker sites that sell employee information, and reviewing WHOIS registrations that tie domain ownership to individual employees. Defenders should implement email authentication (DMARC/DKIM/SPF) to prevent domain spoofing and monitor DMARC reports for unauthorized send attempts. Technical controls include deploying AI-powered email security gateways that detect impersonation attempts, implementing conditional access policies that flag impossible-travel scenarios, and using UEBA (User and Entity Behavior Analytics) to identify anomalous access patterns that may indicate account compromise from credential stuffing. The blue team should also run regular internal social engineering assessments, conduct quarterly phishing simulations with realistic lures based on actual organizational intelligence, and maintain an employee security awareness program that keeps pace with evolving TTPs.
        </p>
        <div class="mt-2">
          <strong class="text-cyan mono" style="font-size:.75rem">DEFENSE TOOLKIT:</strong>
          <div class="mt-1">
            <span class="tool-tag">DMARC Analyzer</span>
            <span class="tool-tag">Have I Been Pwned</span>
            <span class="tool-tag">ZeroFox</span>
            <span class="tool-tag">Digital Shadows</span>
            <span class="tool-tag">KnowBe4</span>
            <span class="tool-tag">Proofpoint TAP</span>
            <span class="tool-tag">Microsoft Defender</span>
          </div>
        </div>
      </div>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 8: THREAT HUNTER'S EYE ======== -->
<section id="hunter" class="section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 08</div>
      <h2>Threat Hunter's Eye</h2>
      <div class="divider"></div>
    </div>

    <div class="hunter-card">
      <h3>&#128270; Hunting for T1589 Indicators</h3>
      <p>
        While T1589 itself is a reconnaissance technique that occurs largely outside your network perimeter, threat hunters can detect indicators that an adversary has gathered or is actively gathering identity information about your organization. The key is looking for evidence of reconnaissance activity and the subsequent use of gathered intelligence in attack attempts.
      </p>

      <div class="mt-2" style="font-family:'Share Tech Mono',monospace;font-size:.8rem;color:#8b5cf6;margin-bottom:1rem">
        HUNTING QUERIES &amp; INDICATORS:
      </div>

      <div class="query-grid">
        <div class="query-row">
          <span class="query-type high">HIGH</span>
          <span>DMARC forensic reports showing spoofed domain send attempts targeting your employees</span>
        </div>
        <div class="query-row">
          <span class="query-type high">HIGH</span>
          <span>Abnormal spikes in failed login attempts across multiple employee accounts (credential stuffing pattern)</span>
        </div>
        <div class="query-row">
          <span class="query-type high">HIGH</span>
          <span>Spear-phishing emails containing accurate internal terminology, project names, or org-chart details not commonly known</span>
        </div>
        <div class="query-row">
          <span class="query-type med">MED</span>
          <span>Unusual VPN or authentication activity from geolocations matching recent employee social media posts about travel</span>
        </div>
        <div class="query-row">
          <span class="query-type med">MED</span>
          <span>Employee credentials found in fresh data breach dumps correlated with your corporate email domain</span>
        </div>
        <div class="query-row">
          <span class="query-type med">MED</span>
          <span>Inbound emails spoofing executive identities that pass SPF but fail DKIM alignment checks</span>
        </div>
        <div class="query-row">
          <span class="query-type low">LOW</span>
          <span>Elevated HTTP requests to public corporate directory pages or employee listing endpoints from unknown IPs</span>
        </div>
        <div class="query-row">
          <span class="query-type low">LOW</span>
          <span>Web server logs showing systematic enumeration of employee pages (sequential user ID or name pattern scanning)</span>
        </div>
      </div>

      <div class="mt-3" style="padding:1rem;border-radius:8px">
        <strong class="text-cyan mono" style="font-size:.78rem">HUNTING TIP:</strong>
        <p style="font-size:.88rem;color:#8fa3b8;margin-top:.5rem">
          Set up automated alerts for DMARC aggregate and forensic reports. A sudden increase in senders failing DMARC checks for your domain ,  especially from email services commonly used for business communication ,  is a strong indicator that an adversary has harvested employee email addresses and is attempting to impersonate your organization. Cross-reference these alerts with LinkedIn changes (new employee profiles, role updates) and recent industry breach disclosures to identify the likely intelligence source.
        </p>
      </div>
    </div>

    <div class="accent-line"></div>
  </div>
</section>

<!-- ======== SECTION 9: CALL-TO-ACTION ======== -->
<section id="cta" class="section cta-section">
  <div class="container">
    <div class="section-header">
      <div class="section-tag">// Section 09</div>
      <h2>Explore Sub-techniques</h2>
      <div class="divider"></div>
    </div>

    <div class="cta-box">
      <h2>Deep Dive into T1589 Sub-techniques</h2>
      <p>
        T1589 encompasses three specialized sub-techniques, each targeting a specific category of identity information. Understanding these granular attack methods is essential for building a comprehensive defense strategy against identity-based reconnaissance and the social engineering attacks it enables.
      </p>

      <div class="subtech-links">
        <a href="T1589.001_Credentials.html" class="subtech-link">
          &#128272; T1589.001 ,  Credentials
        </a>
        <a href="T1589.002_Email_Addresses.html" class="subtech-link">
          &#9993; T1589.002 ,  Email Addresses
        </a>
        <a href="T1589.003_Employee_Names.html" class="subtech-link">
          &#128100; T1589.003 ,  Employee Names
        </a>
      </div>
    </div>
  </div>
</section>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-5b48217 e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="5b48217" data-element_type="container">
				<div class="elementor-element elementor-element-52c9ee1 elementor-widget elementor-widget-html" data-id="52c9ee1" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					
    <div class="attack-card">
        <!-- header with main technique context -->
        <div class="technique-header" style="text-align: center">
            <h2><i class="fas fa-radar" style="font-size: 1.2rem;margin-right: 8px;color: #2de0c0"></i>Gather Victim Identity Information</h2>
        </div>
        <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 10px 0">
        <!-- SUB-TECHNIQUES section (3 items) -->
        <div>
            <div class="section-title">
                <i class="fas fa-bolt"></i> SUB-TECHNIQUES
            </div>
            <ul class="subtech-list">
                <!-- scanning IP blocks -->
                <li>
                    <a href="/credentials-t1589-001/" target="_blank" rel="noopener noreferrer" class="attack-link">
                        <span>Credentials</span>
                        <span class="tech-id">T1589.001</span>
                    </a>
                </li>
                <!-- vulnerability scanning -->
                <li>
                    <a href="/email-addresses-t1589-002/" target="_blank" rel="noopener noreferrer" class="attack-link">
                        <span>Email Addresses</span>
                        <span class="tech-id">T1589.002</span>
                    </a>
                </li>
                <!-- wordlist scanning -->
                <li>
                    <a href="/employee-names-t1589-003/" target="_blank" rel="noopener noreferrer" class="attack-link">
                        <span>Employee Names</span>
                        <span class="tech-id">T1589.003</span>
                    </a>
                </li>
            </ul>
        </div>

        <!-- MITIGATIONS section (pre-compromise) -->
        <div style="margin-bottom: 1.5rem">
            <div class="section-title">
                <i class="fas fa-shield-virus"></i> MITIGATIONS
            </div>
            <div class="mitigation-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Pre-compromise</span>
                    <span class="small-tag" style="text-align: center">M1056</span>
                </a>
            </div>
        </div>

        <!-- DETECTION section -->
        <div style="margin-bottom: 1rem">
            <div class="section-title">
                <i class="fas fa-eye"></i> DETECTION STRATEGY
            </div>
            <div class="detection-item">
                <a href="#" target="_blank" rel="noopener noreferrer" class="compact-link">
                    <span style="text-align: center">Detection of Gather Victim Identity Information</span>
                    <span class="small-tag" style="text-align: center">DET0841</span>
                </a>
            </div>
        </div>
    </div>
    
        <!-- ========== END OF PAGE – DONATION BOX : BRIEF, DIRECT, HONEST ========== -->
    <div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
		<div data-wpr-particles="{&quot;particles&quot;:{&quot;number&quot;:{&quot;value&quot;:400,&quot;density&quot;:{&quot;enable&quot;:true,&quot;value_area&quot;:800}},&quot;color&quot;:{&quot;value&quot;:&quot;#000000&quot;},&quot;shape&quot;:{&quot;type&quot;:&quot;circle&quot;,&quot;stroke&quot;:{&quot;width&quot;:0,&quot;color&quot;:&quot;#000000&quot;},&quot;polygon&quot;:{&quot;nb_sides&quot;:5},&quot;image&quot;:{&quot;src&quot;:&quot;img/github.svg&quot;,&quot;width&quot;:100,&quot;height&quot;:100}},&quot;opacity&quot;:{&quot;value&quot;:0.5,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:1,&quot;opacity_min&quot;:0.1,&quot;sync&quot;:false}},&quot;size&quot;:{&quot;value&quot;:10,&quot;random&quot;:true,&quot;anim&quot;:{&quot;enable&quot;:false,&quot;speed&quot;:40,&quot;size_min&quot;:0.1,&quot;sync&quot;:false}},&quot;line_linked&quot;:{&quot;enable&quot;:false,&quot;distance&quot;:500,&quot;color&quot;:&quot;#000000&quot;,&quot;opacity&quot;:0.4,&quot;width&quot;:2},&quot;move&quot;:{&quot;enable&quot;:true,&quot;speed&quot;:6,&quot;direction&quot;:&quot;bottom&quot;,&quot;random&quot;:false,&quot;straight&quot;:false,&quot;out_mode&quot;:&quot;out&quot;,&quot;bounce&quot;:false,&quot;attract&quot;:{&quot;enable&quot;:false,&quot;rotateX&quot;:600,&quot;rotateY&quot;:1200}}},&quot;interactivity&quot;:{&quot;detect_on&quot;:&quot;window&quot;,&quot;events&quot;:{&quot;onhover&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;bubble&quot;},&quot;onclick&quot;:{&quot;enable&quot;:true,&quot;mode&quot;:&quot;repulse&quot;},&quot;resize&quot;:true},&quot;modes&quot;:{&quot;grab&quot;:{&quot;distance&quot;:400,&quot;line_linked&quot;:{&quot;opacity&quot;:0.5}},&quot;bubble&quot;:{&quot;distance&quot;:400,&quot;size&quot;:4,&quot;duration&quot;:0.3,&quot;opacity&quot;:1,&quot;speed&quot;:3},&quot;repulse&quot;:{&quot;distance&quot;:200,&quot;duration&quot;:0.4},&quot;push&quot;:{&quot;particles_nb&quot;:4},&quot;remove&quot;:{&quot;particles_nb&quot;:2}}},&quot;retina_detect&quot;:true}" particle-source="wpr_particle_json" wpr-quantity="100" wpr-color="#FFFFFF" wpr-speed="3" wpr-shape="circle" wpr-size="4" class="elementor-element elementor-element-b2db48f e-con-full wpr-particle-yes e-flex wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="b2db48f" data-element_type="container">
				<div class="elementor-element elementor-element-4db4792 elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="4db4792" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-e19f7ed e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="e19f7ed" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4cdd8a3 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info" data-id="4cdd8a3" data-element_type="widget" data-widget_type="wpr-post-info.default">
				<div class="elementor-widget-container">
					<ul class="wpr-post-info wpr-post-info-horizontal"><li class="wpr-post-info-author"><span class="wpr-post-info-text"><i aria-hidden="true" class="far fa-copyright"></i></span><span>Cyber Pulse Academy</span></li><li class="wpr-post-info-date"><span>February 13, 2026</span></li><li class="wpr-post-info-comments"><span>  No Comments</span></li></ul>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-590b453 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="590b453" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-3e5da53 wpr-comment-reply-separate wpr-comment-reply-align-right elementor-widget elementor-widget-wpr-post-comments" data-id="3e5da53" data-element_type="widget" data-widget_type="wpr-post-comments.default">
				<div class="elementor-widget-container">
					<div class="wpr-comments-wrap" id="comments">	<div id="respond" class="comment-respond">
		<h3 id="wpr-reply-title" class="wpr-comment-reply-title">Leave a Comment <small><a rel="nofollow" id="cancel-comment-reply-link" href="/tag/t1589/feed/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://www.cyberpulseacademy.com/comments/" method="post" id="wpr-comment-form" class="wpr-comment-form wpr-cf-style-6 wpr-cf-no-url" novalidate><p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p><div class="wpr-comment-form-text"><textarea name="comment" placeholder="Message*" cols="45" rows="8" maxlength="65525"></textarea></div><div class="wpr-comment-form-fields"> <div class="wpr-comment-form-author"><input type="text" name="author" placeholder="Name*"/></div>
<div class="wpr-comment-form-email"><input type="text" name="email" placeholder="Email*"/></div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="wpr-submit-comment" class="wpr-submit-comment" value="Submit" /> <input type='hidden' name='comment_post_ID' value='12559' id='comment_post_ID' />
<input type='hidden' name='comment_parent' id='comment_parent' value='0' />
</p><p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="5abd81d2f2" /></p><br /><div  class='g-recaptcha lz-recaptcha' data-sitekey='6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' data-theme='light' data-size='normal'></div>
<noscript>
	<div style='width: 302px; height: 352px;'>
		<div style='width: 302px; height: 352px; position: relative;'>
			<div style='width: 302px; height: 352px; position: absolute;'>
				<iframe src='https://www.google.com/recaptcha/api/fallback?k=6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' frameborder='0' scrolling='no' style='width: 302px; height:352px; border-style: none;'>
				</iframe>
			</div>
			<div style='width: 250px; height: 80px; position: absolute; border-style: none; bottom: 21px; left: 25px; margin: 0px; padding: 0px; right: 25px;'>
				<textarea name='g-recaptcha-response' class='g-recaptcha-response' style='width: 250px; height: 80px; border: 1px solid #c1c1c1; margin: 0px; padding: 0px; resize: none;' value=''>
				</textarea>
			</div>
		</div>
	</div>
</noscript><br><p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_3" name="ak_js" value="186"/><script>document.getElementById( "ak_js_3" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>	</div><!-- #respond -->
	</div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-c6fb0fd e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="c6fb0fd" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-9102a46 wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="9102a46" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.cyberpulseacademy.com/gather-victim-identity-information-t1589/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
