Forum Discussion
kevinh
1 month agoBronze III
CTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the...
SamDickison
Community Manager
1 month agoHey kevinh, how are you getting on with this? Want me to get some support for you?
- kevinh20 days agoBronze III
yes
- SamDickison19 days ago
Community Manager
OK, I just had a deeper look myself, and I think you're focussing on the initial access rather than the credential access technique. Spearfishing gets the threat actor into the environment and then there is another technique to harvest the credentials.