<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cognitiveattacktaxonomy.org/index.php?action=history&amp;feed=atom&amp;title=Pluridentity_Attack</id>
	<title>Pluridentity Attack - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://cognitiveattacktaxonomy.org/index.php?action=history&amp;feed=atom&amp;title=Pluridentity_Attack"/>
	<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Pluridentity_Attack&amp;action=history"/>
	<updated>2026-04-21T02:57:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Pluridentity_Attack&amp;diff=240&amp;oldid=prev</id>
		<title>Info: Created page with &quot;== &#039;&#039;&#039;Pluridentity Attack  &#039;&#039;&#039; ==  &#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using data acquired from multiple sources to gain access to unintentional access to sensitive data. &lt;br&gt;  &#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-145 &lt;br&gt;  &#039;&#039;&#039;Layer:&#039;&#039;&#039;  7,8,9,10 &lt;br&gt;  &#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Multiple Scales &lt;br&gt;  &#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof of Concept &lt;br&gt;  &#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &lt;br&gt;  &#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &lt;br&gt;  &#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &lt;br&gt;  == &#039;&#039;&#039;Description:&#039;&#039;&#039; ==  &#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &lt;br&gt;  &#039;&#039;&#039;Close...&quot;</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Pluridentity_Attack&amp;diff=240&amp;oldid=prev"/>
		<updated>2024-07-30T03:19:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Pluridentity Attack  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Using data acquired from multiple sources to gain access to unintentional access to sensitive data. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-145 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  7,8,9,10 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Close...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== &amp;#039;&amp;#039;&amp;#039;Pluridentity Attack  &amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Using data acquired from multiple sources to gain access to unintentional access to sensitive data. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2022-145 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  7,8,9,10 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Multiple Scales &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; Proof of Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Brief Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Detailed Description:&amp;#039;&amp;#039;&amp;#039; Using data acquired from multiple sources to gain access to unintentional access to sensitive data. (Exploits Data Vulnerability) For example, reviewing multiple password reset platforms which reveal mobile phone numbers to reset through SMS. If each platform reveals different parts of the mobile number (prefix, suffix, etc.) which the attacker may reassemble into the whole mobile number.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;INTERACTIONS&amp;#039;&amp;#039;&amp;#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Examples:&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Use Case Example(s):&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Example(s) From The Wild:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Comments:&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;References:&amp;#039;&amp;#039;&amp;#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
</feed>