Common Information
Type | Value |
---|---|
Value |
Impersonation - T1656 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary’s ultimate goals, possibly against multiple victims. In many cases of business email compromise or email fraud campaigns, adversaries use impersonation to defraud victims -- deceiving them into sending money or divulging information that ultimately enables [Financial Theft](https://attack.mitre.org/techniques/T1657). Adversaries will often also use social engineering techniques such as manipulative and persuasive language in email subject lines and body text such as `payment`, `request`, or `urgent` to push the victim to act quickly before malicious activity is detected. These campaigns are often specifically targeted against people who, due to job roles and/or accesses, can carry out the adversary’s goal. Impersonation is typically preceded by reconnaissance techniques such as [Gather Victim Identity Information](https://attack.mitre.org/techniques/T1589) and [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591) as well as acquiring infrastructure such as email domains (i.e. [Domains](https://attack.mitre.org/techniques/T1583/001)) to substantiate their false identity.(Citation: CrowdStrike-BEC) There is the potential for multiple victims in campaigns involving impersonation. For example, an adversary may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) targeting one organization which can then be used to support impersonation against other entities.(Citation: VEC) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2019-01-14 | 8 | WNF IDs from w10 build 18312 | ||
Details | Website | 2019-01-01 | 2 | Security Advisory - Proofpoint Protection Server Cross-Site Scripting Vulnerability | ||
Details | Website | 2018-12-19 | 2 | Mobile banking continues to be primary target for advanced trojan attacks | ||
Details | Website | 2018-12-10 | 4 | in(Secure) messaging apps — How side-channel attacks can compromise privacy in WhatsApp, Telegram, and Signal | ||
Details | Website | 2018-12-05 | 8 | RPC Bug Hunting Case Studies – Part 1 | ||
Details | Website | 2018-11-29 | 2 | AWS Security Hub Extends Privileged Access Threat Analytics Capabilities with CyberArk | ||
Details | Website | 2018-11-27 | 0 | Keeping Who-ville Cyber Secure This Holiday Season | ||
Details | Website | 2018-11-12 | 276 | Vulnerability Summary for the Week of November 5, 2018 | CISA | ||
Details | Website | 2018-11-08 | 24 | Attack uses malicious InPage document and outdated VLC media player to give attackers backdoor access to targets - Microsoft Security Blog | ||
Details | Website | 2018-11-08 | 1 | 2018 Phishing and Fraud Report: Attacks Peak During the Holidays | ||
Details | Website | 2018-10-17 | 0 | How Office 365 learned to reel in phish - Microsoft Security Blog | ||
Details | Website | 2018-09-30 | 0 | 威胁建模还有多少用武之地 – 绿盟科技技术博客 | ||
Details | Website | 2018-09-13 | 0 | Abusing Microsoft Customer Voice to Send Phishing Links | ||
Details | Website | 2018-09-11 | 0 | IRS Call Scammers Sentenced in Texas | ||
Details | Website | 2018-09-06 | 14 | Is your Google Analytics code malicious? – Sansec | ||
Details | Website | 2018-08-30 | 11 | Remote Mac Exploitation Via Custom URL Schemes | ||
Details | Website | 2018-08-13 | 7 | Process Doppelgänging meets Process Hollowing in Osiris dropper | Malwarebytes Labs | ||
Details | Website | 2018-07-23 | 0 | How to Do Effective and Impactful Tor Research | Tor Project | ||
Details | Website | 2018-07-20 | 15 | Into the Borg – SSRF inside Google production network | OpnSec | ||
Details | Website | 2018-07-12 | 0 | When three isn't a crowd: Man-in-the-Middle (MitM) attacks explained | Malwarebytes Labs | ||
Details | Website | 2018-07-11 | 32 | Passing-the-Hash to NTLM Authenticated Web Applications | ||
Details | Website | 2018-06-27 | 0 | Marketing Firm Leaked Database With 340 Million Records | ||
Details | Website | 2018-06-11 | 1 | Bypassing Detection for a Reverse Meterpreter Shell - Checkmate | ||
Details | Website | 2018-06-09 | 5 | The Future of Social Engineering - Privacy PC | ||
Details | Website | 2018-05-26 | 39 | module ~ lsadump · gentilkiwi/mimikatz Wiki |