Spearphishing Attachment (T1566.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Initial Access

Initial Access (TA0001)

The adversary is trying to get into your network. Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited-use due to changing passwords.

View on ATT&CK

Procedure Examples

Description Source(s)
Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. ACSC Email Spoofing
Falcone, R., et al. (2018, July 27). New Threat Actor Group DarkHydrus Targets Middle East Government. Retrieved August 2, 2018. Unit 42 DarkHydrus July 2018
Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020. Microsoft Anti Spoofing
Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020. Elastic - Koadiac Detection with EQL