MITRE ATT&CK Technique
Reconnaissance T1589.003
Description

Adversaries may gather employee names that can be used during targeting. Employee names be used to derive email addresses as well as to help guide other reconnaissance efforts and/or craft more-believable lures. Adversaries may easily gather employee names, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: OPM Leak) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Valid Accounts](https://attack.mitre.org/techniques/T1078)).

Supported Platforms
PRE
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-10-02T14:57:15.906Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may gather employee names that can be used during '
                'targeting. Employee names be used to derive email addresses '
                'as well as to help guide other reconnaissance efforts and/or '
                'craft more-believable lures.\n'
                '\n'
                'Adversaries may easily gather employee names, since they may '
                'be readily available and exposed via online or other '
                'accessible data sets (ex: [Social '
                'Media](https://attack.mitre.org/techniques/T1593/001) or '
                '[Search Victim-Owned '
                'Websites](https://attack.mitre.org/techniques/T1594)).(Citation: '
                'OPM Leak) Gathering this information may reveal opportunities '
                'for other forms of reconnaissance (ex: [Search Open '
                'Websites/Domains](https://attack.mitre.org/techniques/T1593) '
                'or [Phishing for '
                'Information](https://attack.mitre.org/techniques/T1598)), '
                'establishing operational resources (ex: [Compromise '
                'Accounts](https://attack.mitre.org/techniques/T1586)), and/or '
                'initial access (ex: '
                '[Phishing](https://attack.mitre.org/techniques/T1566) or '
                '[Valid Accounts](https://attack.mitre.org/techniques/T1078)).',
 'external_references': [{'external_id': 'T1589.003',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1589/003'},
                         {'description': 'Cybersecurity Resource Center. '
                                         '(n.d.). CYBERSECURITY INCIDENTS. '
                                         'Retrieved September 16, 2024.',
                          'source_name': 'OPM Leak',
                          'url': 'https://web.archive.org/web/20230602111604/https://www.opm.gov/cybersecurity/cybersecurity-incidents/'}],
 'id': 'attack-pattern--76551c52-b111-4884-bc47-ff3e728f0156',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'reconnaissance'}],
 'modified': '2025-10-24T17:48:57.975Z',
 'name': 'Employee Names',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['PRE'],
 'x_mitre_version': '1.0'}
Quick Actions
Related Threat Actors (3)
Sandworm Team
High

Kimsuky
High

Silent Librarian
High