MITRE ATT&CK Technique
Reconnaissance T1681
Description

Threat actors may seek information/indicators from closed or open threat intelligence sources gathered about their own campaigns, as well as those conducted by other adversaries that may align with their target industries, capabilities/objectives, or other operational concerns. These reports may include descriptions of behavior, detailed breakdowns of attacks, atomic indicators such as malware hashes or IP addresses, timelines of a group’s activity, and more. Adversaries may change their behavior when planning their future operations. Adversaries have been observed replacing atomic indicators mentioned in blog posts in under a week.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023) Adversaries have also been seen searching for their own domain names in threat vendor data and then taking them down, likely to avoid seizure or further investigation.(Citation: Sentinel One Contagious Interview ClickFix September 2025) This technique is distinct from [Threat Intel Vendors](https://attack.mitre.org/techniques/T1597/001) in that it describes threat actors performing reconnaissance on their own activity, not in search of victim information.

Supported Platforms
PRE
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2025-09-26T15:42:30.468Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Threat actors may seek information/indicators from closed or '
                'open threat intelligence sources gathered about their own '
                'campaigns, as well as those conducted by other adversaries '
                'that may align with their target industries, '
                'capabilities/objectives, or other operational concerns. These '
                'reports may include descriptions of behavior, detailed '
                'breakdowns of attacks, atomic indicators such as malware '
                'hashes or IP addresses, timelines of a group’s activity, and '
                'more. Adversaries may change their behavior when planning '
                'their future operations. \n'
                '\n'
                'Adversaries have been observed replacing atomic indicators '
                'mentioned in blog posts in under a week.(Citation: Google '
                'Cloud Threat Intelligence VMWare ESXi Zero-Day 2023) '
                'Adversaries have also been seen searching for their own '
                'domain names in threat vendor data and then taking them down, '
                'likely to avoid seizure or further investigation.(Citation: '
                'Sentinel One Contagious Interview ClickFix September 2025)\n'
                '\n'
                'This technique is distinct from [Threat Intel '
                'Vendors](https://attack.mitre.org/techniques/T1597/001) in '
                'that it describes threat actors performing reconnaissance on '
                'their own activity, not in search of victim information. ',
 'external_references': [{'external_id': 'T1681',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1681'},
                         {'description': 'Aleksandar Milenkoski, Sreekar '
                                         'Madabushi, Kenneth Kinion. (2025, '
                                         'September 4). Contagious Interview | '
                                         'North Korean Threat Actors Reveal '
                                         'Plans and Ops by Abusing Cyber Intel '
                                         'Platforms. Retrieved October 20, '
                                         '2025.',
                          'source_name': 'Sentinel One Contagious Interview '
                                         'ClickFix September 2025',
                          'url': 'https://www.sentinelone.com/labs/contagious-interview-threat-actors-scout-cyber-intel-platforms-reveal-plans-and-ops/'},
                         {'description': 'Alexander Marvi, Brad Slaybaugh, Ron '
                                         'Craft, and Rufus Brown. (2023, June '
                                         '13). VMware ESXi Zero-Day Used by '
                                         'Chinese Espionage Actor to Perform '
                                         'Privileged Guest Operations on '
                                         'Compromised Hypervisors. Retrieved '
                                         'March 26, 2025.',
                          'source_name': 'Google Cloud Threat Intelligence '
                                         'VMWare ESXi Zero-Day 2023',
                          'url': 'https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/'}],
 'id': 'attack-pattern--63b24abc-5702-4745-b1e4-ac70b20a43f2',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'reconnaissance'}],
 'modified': '2025-10-24T17:48:51.996Z',
 'name': 'Search Threat Vendor Data',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.3.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['PRE'],
 'x_mitre_version': '1.0'}
Quick Actions
Related Threat Actors (2)
UNC3886
High

Contagious Interview
High