Collection (TA0009)

Every operation has an objective, and some involve threat actors harvesting data. The data points typically include personally identifiable information, financial data, intellectual property, credentials, authentication tokens, etc. Data can be harvested for extortion, but it can also be leveraged for subsequent phases of an operation, such as lateral movement. Threat actors’ techniques for collecting data include gathering information from shared and cloud drives, archives, clipboards, removable media, and email folders. They can also collect additional information through screen captures and keyloggers or man-in-the-middle proxies.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center