Technique: Confluence

ID: T1213.001

Export to Word

Description

Adversaries may leverage Confluence repositories to mine valuable information. Often found in development environments alongside Atlassian JIRA, Confluence is generally used to store development-related documentation, however, in general may contain more diverse categories of useful information, such as: * Policies, procedures, and standards * Physical / logical network diagrams * System architecture diagrams * Technical system documentation * Testing / development credentials (i.e., [Unsecured Credentials](https://attack.mitre.org/techniques/T1552)) * Work / project schedules * Source code snippets * Links to network shares and other internal resources

Threat-Mapped Scoring

Threat Score: 1.8
Industry:
Threat Priority: P4 - Informational (Low)

ATT&CK Kill Chain Metadata

APTs (Intrusion Sets)

← Back to Home ← Back to TTP Search