GCP mandiant_digital_threatmon Mappings

Mandiant Digital Threat Monitoring searches the open, deep, and dark web for potential external threats, including malicious targeting, compromised credentials, and supply chain targeting.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
mandiant_digital_threatmon Mandiant Digital Threat Monitoring protect minimal T1078 Valid Accounts
Comments
Mandiant Digital Threat Monitoring continually monitors for compromised credentials and data leaks on both the open and dark web. This control may protect against credential abuse by alerting on leaked credentials. Since this control must depend on accessible sources for dumps, it does not protect against credentials that have been collected for a campaign but never posted, so the score is partial.
References
mandiant_digital_threatmon Mandiant Digital Threat Monitoring detect partial T1195 Supply Chain Compromise
Comments
Mandiant Digital Threat Monitoring continually monitors for compromised credentials and data leaks on both the open and dark web. This control may protect against credential abuse by alerting on leaked credentials. Since this control must depend on accessible sources for dumps, it does not protect against credentials that have been collected for a campaign but never posted, so the score is partial.
References
mandiant_digital_threatmon Mandiant Digital Threat Monitoring detect partial T1199 Trusted Relationship
Comments
Mandiant Digital Threat Monitoring continually monitors for compromised credentials and data leaks on both the open and dark web. This control may protect against credential abuse by alerting on leaked credentials. Since this control must depend on accessible sources for dumps, it does not protect against credentials that have been collected for a campaign but never posted, so the score is partial.
References
mandiant_digital_threatmon Mandiant Digital Threat Monitoring detect partial T1591 Gather Victim Org Information
Comments
Mandiant Digital Threat Monitoring continually monitors for compromised credentials and data leaks on both the open and dark web. This control may protect against Gather Victim Org Information by alerting on custom data leaks. Since this control must depend on accessible sources for dumps, it does not protect against data that has been collected for a campaign but never posted, so the score is partial.
References