TECHNIQUES
- Home
- Techniques
- PRE-ATT&CK
- Identify business relationships
Identify business relationships
Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. [1]
ID: T1283
Sub-techniques:
No sub-techniques
Tactic:
Organizational Information Gathering
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018
Similar Techniques by Tactic
Tactic | Technique |
---|---|
People Information Gathering | Identify business relationships |
Detection
Detectable by Common Defenses (Yes/No/Partial): No
Explanation: Exception to the rule is if the adversary tips off the target that others have been asking about the relationship with them.
Difficulty for the Adversary
Easy for the Adversary (Yes/No): Yes
Explanation: Requires an intensive process. In some industries, business relationships may be public in order to generate business, but this is not the case for all industries and all relationships.
References
- Thor Olavsrud. (2014, September 2). 11 Steps Attackers Took to Crack Target. Retrieved March 5, 2017.
×