Dark Mode
Capec-415 Detail
Pretexting via Phone
Detailed Social Engineering Social Engineering Typical Severity: Low
Parents: 407
An adversary engages in pretexting behavior, assuming some sort of trusted role, and contacting the targeted individual or organization via phone to solicit information from target persons, or manipulate the target into performing an action that serves the adversary's interests. This is the most common social engineering attack. Some of the most commonly effective approaches are to impersonate a fellow employee, impersonate a computer technician or to target help desk personnel.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-415 | capec | https://capec.mitre.org/data/definitions/415.html | |
| REF-348 | reference_from_CAPEC | http://www.social-engineer.org | The Official Social Engineering Portal, Social-Engineer.org, Tick Tock Computers, LLC |
Not present
Not present
Not present
Not present
Not present
Not present