Dark Mode
Capec-508 Detail
Shoulder Surfing
Detailed Physical Security Likelihood: High Typical Severity: High
Parents: 651
Threats: T60 T65 T277 T291 T340 T383 T396
In a shoulder surfing attack, an adversary observes an unaware individual's keystrokes, screen content, or conversations with the goal of obtaining sensitive information. One motive for this attack is to obtain sensitive information about the target for financial, personal, political, or other gains. From an insider threat perspective, an additional motive could be to obtain system/application credentials or cryptographic keys. Shoulder surfing attacks are accomplished by observing the content "over the victim's shoulder", as implied by the name of this attack.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-508 | capec | https://capec.mitre.org/data/definitions/508.html | |
| CWE-200 | cwe | http://cwe.mitre.org/data/definitions/200.html | |
| CWE-359 | cwe | http://cwe.mitre.org/data/definitions/359.html |
Not present
- The adversary typically requires physical proximity to the target's environment, in order to observe their screen or conversation. This may not be the case if the adversary is able to record the target and obtain sensitive information upon review of the recording.
Not present
| Low |
|---|
| In most cases, an adversary can simply observe and retain the desired information. |
| Confidentiality |
|---|
| Read Data |
- An adversary can capture a target's banking credentials and transfer money to adversary-controlled accounts.
- An adversary observes the target's mobile device lock screen pattern/passcode and then steals the device, which can now be unlocked.
- An insider could obtain database credentials for an application and sell the credentials on the black market.
- An insider overhears a conversation pertaining to classified information, which could then be posted on an anonymous online forum.