T1114.001 Local Email Collection

Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files.

Outlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file sizes up to 50GB, while earlier versions of Outlook support up to 20GB.(Citation: Outlook File Sizes) IMAP accounts in Outlook 2013 (and earlier) and POP accounts use Outlook Data Files (.pst) as opposed to .ost, whereas IMAP accounts in Outlook 2016 (and later) use .ost files. Both types of Outlook data files are typically stored in C:\Users\<username>\Documents\Outlook Files or C:\Users\<username>\AppData\Local\Microsoft\Outlook.(Citation: Microsoft Outlook Files)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.AA-03.03 Email verification mechanisms Mitigates T1114.001 Local Email Collection
Comments
This diagnostic statement provides protection from adversaries that try to gain sensitive information and data from users via email. Utilizing methods such as encryption and using public cryptic keys are recommended to minimize the risk of adversaries collecting information from files saved on email servers and caches.
References
    PR.PS-01.06 Encryption management practices Mitigates T1114.001 Local Email Collection
    Comments
    This diagnostic statement is associated with employing encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to email collection, the use of encryption provides an added layer of security to sensitive information sent over email. Encryption using public key cryptography requires the adversary to obtain the private certificate along with an encryption key to decrypt messages. File encryption should be enforced across email communications containing sensitive information that may be obtained through access to email services.
    References
      PR.PS-01.07 Cryptographic keys and certificates Mitigates T1114.001 Local Email Collection
      Comments
      This diagnostic statement protects against Local Email Collection through the use of key management. Employing key protection strategies for key material used in protection of emails, limitations to specific accounts along with access control mechanisms provides protection against adversaries abusing local email collection.
      References
        ID.AM-08.03 Data governance and lifecycle management Mitigates T1114.001 Local Email Collection
        Comments
        This diagnostic statement prevents adversaries from manipulating emails and having the ability to collect sensitive data (PII) from users. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
        References
          ID.AM-08.05 Data destruction procedures Mitigates T1114.001 Local Email Collection
          Comments
          This diagnostic statement prevents adversaries from manipulating emails and having the ability to collect sensitive data (PII) from users. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
          References
            PR.PS-01.05 Encryption standards Mitigates T1114.001 Local Email Collection
            Comments
            This diagnostic statement is associated with employing strong encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to email collection, the use of encryption provides an added layer of security to sensitive information sent over email. Encryption using public key cryptography requires the adversary to obtain the private certificate along with an encryption key to decrypt messages. File encryption should be enforced across email communications containing sensitive information that may be obtained through access to email services.
            References

              NIST 800-53 Mappings

              Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
              SC-37 Out-of-band Channels mitigates T1114.001 Local Email Collection
              AC-17 Remote Access mitigates T1114.001 Local Email Collection
              AC-19 Access Control for Mobile Devices mitigates T1114.001 Local Email Collection
              SI-12 Information Management and Retention mitigates T1114.001 Local Email Collection
              SI-07 Software, Firmware, and Information Integrity mitigates T1114.001 Local Email Collection
              AC-16 Security and Privacy Attributes mitigates T1114.001 Local Email Collection
              AC-20 Use of External Systems mitigates T1114.001 Local Email Collection
              SI-04 System Monitoring mitigates T1114.001 Local Email Collection
              AC-04 Information Flow Enforcement mitigates T1114.001 Local Email Collection

              VERIS Mappings

              Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
              attribute.confidentiality.data_disclosure None related-to T1114.001 Local Email Collection