Dark Mode

Settings

Capec-151 Detail

Identity Spoofing

Meta Social Engineering Communications Software Hardware Likelihood: Medium Typical Severity: Medium

Children: 89 98 194 195 473

Threats: T59 T263 T271 T292 T307

Tools: 12 13

Description

Identity Spoofing refers to the action of assuming (i.e., taking on) the identity of some other entity (human or non-human) and then using that identity to accomplish a goal. An adversary may craft messages that appear to come from a different principle or use stolen / spoofed authentication credentials.

Extended Description

Alternatively, an adversary may intercept a message from a legitimate sender and attempt to make it look like the message comes from them without changing its content. The latter form of this attack can be used to hijack credentials from legitimate users. Identity Spoofing attacks need not be limited to transmitted messages - any resource that is associated with an identity (for example, a file with a signature) can be the target of an attack where the adversary attempts to change the apparent identity. This attack differs from Content Spoofing attacks where the adversary does not wish to change the apparent identity of the message but instead wishes to change what the message says. In an Identity Spoofing attack, the adversary is attempting to change the identity of the content.
External ID Source Link Description
CAPEC-151 capec https://capec.mitre.org/data/definitions/151.html
CWE-287 cwe http://cwe.mitre.org/data/definitions/287.html

Not present

  1. The identity associated with the message or resource must be removable or modifiable in an undetectable way.
  1. None: No specialized resources are required to execute this type of attack.

Not present

Integrity Access Control Authentication Confidentiality
Gain Privileges Gain Privileges Gain Privileges Gain Privileges

Not present