MITRE ATT&CK Technique
Discovery T1069
Description

Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions. Adversaries may attempt to discover group permission settings in many different ways. This data may provide the adversary with information about the compromised environment that can be used in follow-on activity and targeting.(Citation: CrowdStrike BloodHound April 2018)

Supported Platforms
Containers IaaS Identity Provider Linux macOS Office Suite SaaS Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2017-05-31T21:30:55.471Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may attempt to discover group and permission '
                'settings. This information can help adversaries determine '
                'which user accounts and groups are available, the membership '
                'of users in particular groups, and which users and groups '
                'have elevated permissions.\n'
                '\n'
                'Adversaries may attempt to discover group permission settings '
                'in many different ways. This data may provide the adversary '
                'with information about the compromised environment that can '
                'be used in follow-on activity and targeting.(Citation: '
                'CrowdStrike BloodHound April 2018)',
 'external_references': [{'external_id': 'T1069',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1069'},
                         {'description': 'Kubernetes. (n.d.). Authorization '
                                         'Overview. Retrieved June 24, 2021.',
                          'source_name': 'K8s Authorization Overview',
                          'url': 'https://kubernetes.io/docs/reference/access-authn-authz/authorization/'},
                         {'description': 'Red Team Labs. (2018, April 24). '
                                         'Hidden Administrative Accounts: '
                                         'BloodHound to the Rescue. Retrieved '
                                         'October 28, 2020.',
                          'source_name': 'CrowdStrike BloodHound April 2018',
                          'url': 'https://www.crowdstrike.com/blog/hidden-administrative-accounts-bloodhound-to-the-rescue/'}],
 'id': 'attack-pattern--15dbf668-795c-41e6-8219-f0447c0e64ce',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'discovery'}],
 'modified': '2025-10-24T17:48:26.378Z',
 'name': 'Permission Groups Discovery',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Daniel Prizmant, Palo Alto Networks',
                          'Yuval Avrahami, Palo Alto Networks',
                          'Microsoft Threat Intelligence Center (MSTIC)'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Containers',
                       'IaaS',
                       'Identity Provider',
                       'Linux',
                       'macOS',
                       'Office Suite',
                       'SaaS',
                       'Windows'],
 'x_mitre_version': '2.6'}
Quick Actions
Related Threat Actors (8)
Scattered Spider
High

FIN13
High

Volt Typhoon
High

TA505
High

APT41
High