Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Reconnaissance
  4. >ATTACK-T1681
ATTACK-T1681Active

Search Threat Vendor Data

Statement

Threat actors may seek information/indicators from closed or open threat intelligence sources gathered about their own campaigns, as well as those conducted by other adversaries that may align with their target industries, capabilities/objectives, or other operational concerns. These reports may include descriptions of behavior, detailed breakdowns of attacks, atomic indicators such as malware hashes or IP addresses, timelines of a group’s activity, and more. Adversaries may change their behavior when planning their future operations.

Adversaries have been observed replacing atomic indicators mentioned in blog posts in under a week.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023) Adversaries have also been seen searching for their own domain names in threat vendor data and then taking them down, likely to avoid seizure or further investigation.(Citation: Sentinel One Contagious Interview ClickFix September 2025)

This technique is distinct from Threat Intel Vendors in that it describes threat actors performing reconnaissance on their own activity, not in search of victim information.

Location

Tactic
Reconnaissance

Technique Details

Identifier
ATTACK-T1681
ATT&CK Page
View on MITRE

Tactics

Reconnaissance

Platforms

PRE

Detection

Detection of Search Threat Vendor Data

Mitigations

Pre-compromise: Pre-compromise mitigations involve proactive measures and defenses implemented to prevent adversaries from successfully identifying and exploiting weaknesses during the Reconnaissance and Resource Development phases of an attack. These activities focus on reducing an organization's attack surface, identify adversarial preparation efforts, and increase the difficulty for attackers to conduct successful operations. This mitigation can be implemented through the following measures:

Limit Information Exposure:

  • Regularly audit and sanitize publicly available data, including job posts, websites, and social media.
  • Use tools like OSINT monitoring platforms (e.g., SpiderFoot, Recon-ng) to identify leaked information.

Protect Domain and DNS Infrastructure:

  • Enable DNSSEC and use WHOIS privacy protection.
  • Monitor for domain hijacking or lookalike domains using services like RiskIQ or DomainTools.

External Monitoring:

  • Use tools like Shodan, Censys to monitor your external attack surface.
  • Deploy external vulnerability scanners to proactively address weaknesses.

Threat Intelligence:

  • Leverage platforms like MISP, Recorded Future, or Anomali to track adversarial infrastructure, tools, and activity.

Content and Email Protections:

  • Use email security solutions like Proofpoint, Microsoft Defender for Office 365, or Mimecast.
  • Enforce SPF/DKIM/DMARC policies to protect against email spoofing.

Training and Awareness:

  • Educate employees on identifying phishing attempts, securing their social media, and avoiding information leaks.

No cross-framework mappings available

← Back to Reconnaissance
Reconnaissance45 controls
ATTACK-T1589Gather Victim Identity InformationATTACK-T1589.001CredentialsATTACK-T1589.002Email AddressesATTACK-T1589.003Employee NamesATTACK-T1590Gather Victim Network InformationATTACK-T1590.001Domain PropertiesATTACK-T1590.002DNSATTACK-T1590.003Network Trust DependenciesATTACK-T1590.004Network TopologyATTACK-T1590.005IP AddressesATTACK-T1590.006Network Security AppliancesATTACK-T1591Gather Victim Org InformationATTACK-T1591.001Determine Physical LocationsATTACK-T1591.002Business RelationshipsATTACK-T1591.003Identify Business TempoATTACK-T1591.004Identify RolesATTACK-T1592Gather Victim Host InformationATTACK-T1592.001HardwareATTACK-T1592.002SoftwareATTACK-T1592.003FirmwareATTACK-T1592.004Client ConfigurationsATTACK-T1593Search Open Websites/DomainsATTACK-T1593.001Social MediaATTACK-T1593.002Search EnginesATTACK-T1593.003Code RepositoriesATTACK-T1594Search Victim-Owned WebsitesATTACK-T1595Active ScanningATTACK-T1595.001Scanning IP BlocksATTACK-T1595.002Vulnerability ScanningATTACK-T1595.003Wordlist ScanningATTACK-T1596Search Open Technical DatabasesATTACK-T1596.001DNS/Passive DNSATTACK-T1596.002WHOISATTACK-T1596.003Digital CertificatesATTACK-T1596.004CDNsATTACK-T1596.005Scan DatabasesATTACK-T1597Search Closed SourcesATTACK-T1597.001Threat Intel VendorsATTACK-T1597.002Purchase Technical DataATTACK-T1598Phishing for InformationATTACK-T1598.001Spearphishing ServiceATTACK-T1598.002Spearphishing AttachmentATTACK-T1598.003Spearphishing LinkATTACK-T1598.004Spearphishing VoiceATTACK-T1681Search Threat Vendor Data