Dark Mode

Settings

Capec-413 Detail

Pretexting via Tech Support

Detailed Social Engineering Social Engineering Typical Severity: Low

Parents: 407

Description

An adversary engages in pretexting behavior, assuming the role of a tech support worker, to solicit information from target persons, or manipulate the target into performing an action that serves the adversary's interests. An adversary who uses social engineering to impersonate a tech support worker can have devastating effects on a network. This is an effective attack vector, because it can give an adversary physical access to network computers. It only takes a matter of seconds for someone to compromise a computer with physical access. One of the best technological tools at the disposal of a social engineer, posing as a technical support person, is a USB thumb drive. These are small, easy to conceal, and can be loaded with different payloads depending on what task needs to be done. However, this form of attack does not require physical access as it can also be effectively carried out via phone or email.

Not present

External ID Source Link Description
CAPEC-413 capec https://capec.mitre.org/data/definitions/413.html
REF-348 reference_from_CAPEC http://www.social-engineer.org The Official Social Engineering Portal, Social-Engineer.org, Tick Tock Computers, LLC

Not present

Not present

Not present

Not present

Not present

Not present