Remote Device Management Services (T1430.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Collection
  • Discovery

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
Brian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018. Krebs-Location
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue