Identify business relationships - T1283 (73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a)
This object is deprecated as its content has been merged into the enterprise domain. Please see the PRE matrix for its replacement. The prior content of this page has been preserved here.
Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. (Citation: 11StepsAttackers)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Identify business relationships - T1283 (73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a) | Attack Pattern | Identify business relationships - T1272 (5b6ce031-bb86-407a-9984-2b9700ac4549) | Attack Pattern | 1 |