Skip to content

Collection

The adversary is trying to gather data of interest to their goal.

Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary’s objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.

In cloud environments, adversaries collect data from storage services (S3, Blob Storage, GCS), databases, and snapshots. They may create copies of EBS volumes or database snapshots, query data warehouses, or access logging buckets that contain sensitive operational data.

View Collection on MITRE ATT&CK →