T1534 Internal Spearphishing
After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user’s device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating Impersonation.3
For example, adversaries may leverage Spearphishing Attachment or Spearphishing Link as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through Input Capture on sites that mimic login interfaces.
Adversaries may also leverage internal chat apps, such as Microsoft Teams, to spread malicious content or engage users in attempts to capture sensitive information and/or credentials.2
| Item | Value |
|---|---|
| ID | T1534 |
| Sub-techniques | |
| Tactics | TA0008 |
| Platforms | Linux, Office Suite, SaaS, Windows, macOS |
| Version | 1.4 |
| Created | 04 September 2019 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| G0047 | Gamaredon Group | Gamaredon Group has used an Outlook VBA module on infected systems to send phishing emails with malicious attachments to other employees within the organization.4 |
| G1001 | HEXANE | HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.7 |
| G0094 | Kimsuky | Kimsuky has sent internal spearphishing emails for lateral movement after stealing victim information.5 |
| G0065 | Leviathan | Leviathan has conducted internal spearphishing within the victim’s environment for lateral movement.6 |
| C0022 | Operation Dream Job | During Operation Dream Job, Lazarus Group conducted internal spearphishing from within a compromised organization.8 |
References
-
Chris Taylor. (2017, October 5). When Phishing Starts from the Inside. Retrieved October 8, 2019. ↩
-
Microsoft Threat Intelligence. (2023, August 2). Midnight Blizzard conducts targeted social engineering over Microsoft Teams. Retrieved February 16, 2024. ↩
-
Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020. ↩
-
KISA. (2021). Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi. Retrieved March 8, 2024. ↩
-
CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021. ↩
-
SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19 ↩
-
ClearSky Research Team. (2020, August 13). Operation ‘Dream Job’ Widespread North Korean Espionage Campaign. Retrieved December 20, 2021. ↩