CognitiveAttackTaxonomy: Difference between revisions
From Cognitive Attack Taxonomy
Created page with "test" |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable sortable" | |||
|+ '''Cognitive Attack Taxonomy'''<br> | |||
|- | |||
! CAT ID !! CAT Name !! Category !! Layer | |||
|- CAT ID CAT Name Category Layer | |||
| CAT-2021-001 || [[High Openess]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-002 || [[High Conscientiousness]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-003 || [[High Extraversion]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-004 || [[High Agreeableness]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-005 || [[High Neuroticism]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-006 || [[Authority (Invocation of)]] || 8 || Exploit | |||
|- | |||
| CAT-2021-006 || [[Low Openess (Closed to experience)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-007 || [[Low Conscientiousness]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-007 || [[Reciprocation (Invoking)]] || 8 || Exploit | |||
|- | |||
| CAT-2021-008 || [[Low Extraversion (Introverted)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-009 || [[Low Agreeableness (Disagreeable)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2021-010 || [[Excitement (Appeal to)]] || 8 || Exploit | |||
|- | |||
| CAT-2022-001 || [[Fogg Model of Behavior]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-002 || [[Forcing Function]] || 8 || TTP | |||
|- | |||
| CAT-2022-003 || [[Nudging]] || 8 || TTP | |||
|- | |||
| CAT-2022-004 || [[Addictive Technology]] || 8 || TTP | |||
|- | |||
| CAT-2022-005 || [[Bait and Switch]] || 8 || TTP | |||
|- | |||
| CAT-2022-006 || [[Click-Bait]] || 8 || TTP | |||
|- | |||
| CAT-2022-007 || [[Confirmshaming]] || 8 || TTP | |||
|- | |||
| CAT-2022-008 || [[Dark Design Patterns]] || 8 || TTP | |||
|- | |||
| CAT-2022-009 || [[Disguised Ads]] || 8 || TTP | |||
|- | |||
| CAT-2022-010 || [[Forced Continuity]] || 8 || TTP | |||
|- | |||
| CAT-2022-011 || [[Friend Spam]] || 8 || TTP | |||
|- | |||
| CAT-2022-012 || [[Hidden Costs]] || 8 || TTP | |||
|- | |||
| CAT-2022-013 || [[Malvertisement]] || 8 || TTP | |||
|- | |||
| CAT-2022-014 || [[Misdirection - Distraction]] || 8 || Exploit | |||
|- | |||
| CAT-2022-015 || [[Mouse-Trapping]] || 8 || TTP | |||
|- | |||
| CAT-2022-016 || [[Persuasive Technology]] || 8 || TTP | |||
|- | |||
| CAT-2022-017 || [[Price Comparison Prevention]] || 8 || TTP | |||
|- | |||
| CAT-2022-018 || [[Privacy Zuckering]] || 8 || TTP | |||
|- | |||
| CAT-2022-019 || [[Roach Motel]] || 8 || TTP | |||
|- | |||
| CAT-2022-020 || [[Scareware]] || 8 || TTP | |||
|- | |||
| CAT-2022-021 || [[Sneak into Basket]] || 8 || TTP | |||
|- | |||
| CAT-2022-022 || [[Spam]] || 8 || TTP | |||
|- | |||
| CAT-2022-023 || [[Trick Questions]] || 8 || TTP | |||
|- | |||
| CAT-2022-024 || [[Zucked]] || 8 || TTP | |||
|- | |||
| CAT-2022-025 || [[Brandjacking]] || 8 || TTP | |||
|- | |||
| CAT-2022-026 || [[Familiarity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-027 || [[Fluency Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-028 || [[Lateral Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-029 || [[Social Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-030 || [[Typosquatting]] || 8 || TTP | |||
|- | |||
| CAT-2022-031 || [[Water Hole Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-032 || [[Wi-Fi Evil Twin]] || 8 || TTP | |||
|- | |||
| CAT-2022-033 || [[Wikijacking]] || 8 || TTP | |||
|- | |||
| CAT-2022-034 || [[Actor-Observer Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-035 || [[Ambient Tactical Deception Attacks]] || 8 || TTP | |||
|- | |||
| CAT-2022-036 || [[Ambiguous Self Induced Disinformation Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-037 || [[Anchoring]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-038 || [[Availability Heuristic]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-039 || [[Barnum Statement]] || 8 || TTP | |||
|- | |||
| CAT-2022-040 || [[Base Rate Neglect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-041 || [[Belief Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-042 || [[Ben Franklin Effect]] || 8 || Exploit | |||
|- | |||
| CAT-2022-043 || [[Classical Conditioning]] || 8 || Exploit | |||
|- | |||
| CAT-2022-044 || [[Clustering Illusion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-045 || [[Cognitive Deception]] || 8 || Exploit | |||
|- | |||
| CAT-2022-046 || [[Cognitive Dissonance]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-047 || [[Cognitive Malware]] || 8 || Exploit | |||
|- | |||
| CAT-2022-048 || [[Confirmation Bias]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-049 || [[Context Dependent Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-050 || [[Decision Fatigue]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-051 || [[Decoy Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-052 || [[Default Bias]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-053 || [[Dread Aversion ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-054 || [[Dunning–Kruger Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-055 || [[Ear Worm]] || 8 || Exploit | |||
|- | |||
| CAT-2022-056 || [[Egocentric Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-057 || [[Endowment Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-058 || [[False Consensus Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-059 || [[False Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-060 || [[False Uniqueness Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-061 || [[Fear of Missing Out]] || 8 || Exploit | |||
|- | |||
| CAT-2022-062 || [[Foot-In-the-Door Technique]] || 8 || TTP | |||
|- | |||
| CAT-2022-063 || [[Framing Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-064 || [[Frequency Illusion]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-065 || [[Functional Fixedness ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-066 || [[Fundamental Attribution Error ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-067 || [[Gambler's Fallacy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-068 || [[Halo Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-069 || [[Hindsight Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-070 || [[Hyperbolic Discounting]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-071 || [[IKEA Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-072 || [[Illusion of Control ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-073 || [[Illusory Correlation ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-074 || [[Innoculation (Effect)]] || 8 || Exploit | |||
|- | |||
| CAT-2022-075 || [[Involuntary Memory]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-076 || [[Involuntary Musical Imagery]] || 8 || Exploit | |||
|- | |||
| CAT-2022-077 || [[Leveling and Sharpening ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-078 || [[Levels-of-Processing Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-079 || [[Loss Aversion]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-080 || [[Magnetizer - Self-Relevance]] || 8 || Exploit | |||
|- | |||
| CAT-2022-081 || [[Malware-Induced Misperception Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-082 || [[Mental Set]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-083 || [[Mood-Congruent Memory ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-084 || [[Mother Teresa Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-085 || [[Mystery Magnetizer]] || 8 || Exploit | |||
|- | |||
| CAT-2022-086 || [[Narrative Influence]] || 8 || Exploit | |||
|- | |||
| CAT-2022-087 || [[Negativity Bias]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-088 || [[Neglect of Probability ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-089 || [[Next-In-Line-Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-090 || [[Omission Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-091 || [[Optimism Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-092 || [[Overconfidence]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-093 || [[Peak-End Rule ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-094 || [[Planning Fallacy ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-095 || [[Pre-Suasion]] || 8 || Exploit | |||
|- | |||
| CAT-2022-096 || [[Probability Blindness]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-097 || [[Relativism]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-098 || [[Risk Homeostasis]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-099 || [[Satisficing]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-100 || [[Search Engine Manipulation Effect]] || 8 || Exploit | |||
|- | |||
| CAT-2022-101 || [[Self-Relevance Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-102 || [[Self-Serving Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-103 || [[Serial Position Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-104 || [[Source Monitoring Error]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-105 || [[Spacing Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-106 || [[Spotlight Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-107 || [[Status Quo Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-108 || [[Straw Man (argument)]] || 8 || TTP | |||
|- | |||
| CAT-2022-109 || [[Subjective Validation]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-110 || [[Suggestion]] || 8 || TTP | |||
|- | |||
| CAT-2022-111 || [[Unfinished (Magnetizer)]] || 8 || Exploit | |||
|- | |||
| CAT-2022-112 || [[von Restorff Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-113 || [[Whorfianism]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-114 || [[Zeigarnik Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-115 || [[Curiosity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-116 || [[Configuration Error (Mistake)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-117 || [[Disposal Errors]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-118 || [[Leakage Errors]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-119 || [[Loss Error]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-120 || [[Mis-Addressed Email]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-121 || [[Transmission Error]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-122 || [[Astro-Turfing]] || 8 || TTP | |||
|- | |||
| CAT-2022-123 || [[Clone Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-124 || [[Cognitive Malware Injection]] || 8 || TTP | |||
|- | |||
| CAT-2022-125 || [[Gaslighting]] || 8 || TTP | |||
|- | |||
| CAT-2022-126 || [[Greenwashing]] || 8 || TTP | |||
|- | |||
| CAT-2022-127 || [[Honey Phish]] || 8 || TTP | |||
|- | |||
| CAT-2022-128 || [[Honey Pot]] || 8 || TTP | |||
|- | |||
| CAT-2022-129 || [[Honey Token]] || 8 || TTP | |||
|- | |||
| CAT-2022-130 || [[Honey Trap]] || 8 || TTP | |||
|- | |||
| CAT-2022-131 || [[Impersonation Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-132 || [[Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-133 || [[Pretext - Pretexting]] || 8 || TTP | |||
|- | |||
| CAT-2022-134 || [[Reverse Social Engineering]] || 8 || TTP | |||
|- | |||
| CAT-2022-135 || [[Scambaiting]] || 8 || TTP | |||
|- | |||
| CAT-2022-136 || [[Semantic Attack]] || 7, 8, or 9 || Exploit | |||
|- | |||
| CAT-2022-137 || [[Shill]] || 8 || TTP | |||
|- | |||
| CAT-2022-138 || [[Shilling Attack]] || 9 || TTP | |||
|- | |||
| CAT-2022-139 || [[SMSishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-140 || [[Sock-Puppetry]] || 8 || TTP | |||
|- | |||
| CAT-2022-141 || [[Spear Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-142 || [[Vish - Vishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-143 || [[Data Vulnerability]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-144 || [[Inference Attack]] || 7,8,9,10 || Exploit | |||
|- | |||
| CAT-2022-145 || [[Pluridentity Attack]] || 7,8,9,10 || Exploit | |||
|- | |||
| CAT-2022-146 || [[Sniper Ad Targeting]] || 8 || TTP | |||
|- | |||
| CAT-2022-147 || [[Tailored Messaging]] || 8 || TTP | |||
|- | |||
| CAT-2022-148 || [[Whaling]] || 8 || TTP | |||
|- | |||
| CAT-2022-149 || [[Change of Scene]] || 8 || TTP | |||
|- | |||
| CAT-2022-150 || [[Complaining (Tendency to)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-151 || [[Criticism]] || 8 || TTP | |||
|- | |||
| CAT-2022-152 || [[Deliberate False Statement]] || 8 || TTP | |||
|- | |||
| CAT-2022-153 || [[Direct Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-154 || [[Disbelief]] || 8 || TTP | |||
|- | |||
| CAT-2022-155 || [[Elicitation (of Information)]] || 8 || TTP | |||
|- | |||
| CAT-2022-156 || [[Emotional Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-157 || [[Establish Your Identity]] || 8 || TTP | |||
|- | |||
| CAT-2022-158 || [[Ethical Dilemma]] || 8 || TTP | |||
|- | |||
| CAT-2022-159 || [[Fear-Down Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-160 || [[Fear-Up Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-161 || [[File and Dossier]] || 8 || TTP | |||
|- | |||
| CAT-2022-162 || [[Flattery]] || 8 || TTP | |||
|- | |||
| CAT-2022-163 || [[Futility]] || 8 || TTP | |||
|- | |||
| CAT-2022-164 || [[Hour Glass Method]] || 8 || TTP | |||
|- | |||
| CAT-2022-165 || [[Incentive Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-166 || [[Naïve Mentality]] || 8 || TTP | |||
|- | |||
| CAT-2022-167 || [[Neuro-Linguistic Programming]] || 8 || Exploit | |||
|- | |||
| CAT-2022-168 || [[Oblique Reference]] || 8 || TTP | |||
|- | |||
| CAT-2022-169 || [[Pride and Ego Approach]] || 8 || TTP | |||
|- | |||
| CAT-2022-170 || [[Provocative Statement]] || 8 || TTP | |||
|- | |||
| CAT-2022-171 || [[Quid Pro Quo]] || 8 || TTP | |||
|- | |||
| CAT-2022-172 || [[Rapid Fire]] || 8 || TTP | |||
|- | |||
| CAT-2022-173 || [[Repeat-a-Word]] || 8 || TTP | |||
|- | |||
| CAT-2022-174 || [[Repetition (Tactic)]] || 8 || TTP | |||
|- | |||
| CAT-2022-175 || [[Rubber-Hose Cryptanalysis]] || 8 || Exploit | |||
|- | |||
| CAT-2022-176 || [[Secret Knowledge]] || 8 || TTP | |||
|- | |||
| CAT-2022-177 || [[Sensory Matching]] || 8 || TTP | |||
|- | |||
| CAT-2022-178 || [[Silence]] || 8 || TTP | |||
|- | |||
| CAT-2022-179 || [[We Know All]] || 8 || TTP | |||
|- | |||
| CAT-2022-180 || [[File Masquerading]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-181 || [[Ignorance]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-182 || [[Traitor Tracing]] || 8 || TTP | |||
|- | |||
| CAT-2022-183 || [[Clickjacking]] || 8 || TTP | |||
|- | |||
| CAT-2022-184 || [[IDN Homograph Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-185 || [[Like Jacking]] || 8 || TTP | |||
|- | |||
| CAT-2022-186 || [[Perceptual Deception]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-187 || [[Social Jacking]] || 8 || TTP | |||
|- | |||
| CAT-2022-188 || [[Video Puppetry]] || 8 || TTP | |||
|- | |||
| CAT-2022-189 || [[Automaticity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-190 || [[Boredom]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-191 || [[Distracted Approach (Distraction)]] || 8 || TTP | |||
|- | |||
| CAT-2022-192 || [[Focusing Effect ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-193 || [[Gray Signal Attacks]] || 8 || TTP | |||
|- | |||
| CAT-2022-194 || [[Human Buffer Overflow]] || 8 || Exploit | |||
|- | |||
| CAT-2022-195 || [[Noise Injection]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-196 || [[Prevalence Paradox]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-197 || [[Tab-Napping]] || 8 || TTP | |||
|- | |||
| CAT-2022-198 || [[Interoceptive Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-199 || [[P300 Guilty Knowledge Test]] || 8 || TTP | |||
|- | |||
| CAT-2022-200 || [[Sonic Area Denial ]] || 8 || TTP | |||
|- | |||
| CAT-2022-201 || [[Strobe Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-202 || [[Zombification]] || 8 || Exploit | |||
|- | |||
| CAT-2022-203 || [[Ingroup Bias]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-204 || [[Mass Psychogenic Illness]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-205 || [[Network Manipulated Affect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-206 || [[Outgroup Homogeneity Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-207 || [[Social Desirability Bias ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-208 || [[Stereotyping ]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-209 || [[Streisand Effect]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-210 || [[Sympathy]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-211 || [[Trevor's Axiom]] || 8 || Exploit | |||
|- | |||
| CAT-2022-212 || [[Trolling]] || 8 || TTP | |||
|- | |||
| CAT-2022-213 || [[Wall Banging ]] || 8 || TTP | |||
|- | |||
| CAT-2022-214 || [[Network Affect Contagion]] || 7, 8 || Vulnerability | |||
|- | |||
| CAT-2022-215 || [[Assistance (Need to Provide)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-216 || [[Authority (Deference to)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-217 || [[Bandwagon Effect ]] || 8 || Exploit | |||
|- | |||
| CAT-2022-218 || [[Commitment-Consistency]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-219 || [[Door-in-the-Face Technique]] || 8 || TTP | |||
|- | |||
| CAT-2022-220 || [[Liking]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-221 || [[Party Crashing]] || 8 || TTP | |||
|- | |||
| CAT-2022-222 || [[Pawn - Pivot]] || 8 || TTP | |||
|- | |||
| CAT-2022-223 || [[Reciprocity (Need for)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-224 || [[Reversing Authority]] || 8 || TTP | |||
|- | |||
| CAT-2022-225 || [[Scarcity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-226 || [[Social Proof]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-227 || [[Unity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-228 || [[Spectrum of Allies]] || 8 || TTP | |||
|- | |||
| CAT-2022-229 || [[Cybersquatting]] || 9 || TTP | |||
|- | |||
| CAT-2022-230 || [[Escalation Attack]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-231 || [[Shadow AP]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-232 || [[Shadow IT]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-233 || [[Shadow Security]] || 9 || Vulnerability | |||
|- | |||
| CAT-2022-234 || [[Supply Chain Attack]] || 9 || Exploit | |||
|- | |||
| CAT-2022-235 || [[Lawfare]] || 10 || Exploit | |||
|- | |||
| CAT-2022-236 || [[Legal Loophole]] || 10 || Vulnerability | |||
|- | |||
| CAT-2022-237 || [[Patent Trolling]] || 10 || TTP | |||
|- | |||
| CAT-2022-238 || [[Strategic Lawsuit Against Public Participation]] || 10 || TTP | |||
|- | |||
| CAT-2022-239 || [[Spamigation]] || 10 || TTP | |||
|- | |||
| CAT-2022-240 || [[Robo Calling]] || 8 || TTP | |||
|- | |||
| CAT-2022-241 || [[Acoustic Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-242 || [[Dolphin Attack]] || 8 || Exploit | |||
|- | |||
| CAT-2022-243 || [[Robot Social Engineering]] || 8 || TTP | |||
|- | |||
| CAT-2022-244 || [[Assistance Ploy]] || 8 || Exploit | |||
|- | |||
| CAT-2022-245 || [[Baiting - Drop]] || 8 || TTP | |||
|- | |||
| CAT-2022-246 || [[Dumpster Diving]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-247 || [[Shoulder Surfing]] || 8 || TTP | |||
|- | |||
| CAT-2022-248 || [[Snail Mail Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-249 || [[Tailgating ]] || 8 || TTP | |||
|- | |||
| CAT-2022-250 || [[War Shipping]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-251 || [[Advance Fee Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-252 || [[Business Email Compromise]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-253 || [[Cat Fishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-254 || [[Crab Phishing]] || 8 || TTP | |||
|- | |||
| CAT-2022-255 || [[Gift-Card Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-256 || [[Hoax Virus]] || 8 || TTP | |||
|- | |||
| CAT-2022-257 || [[Romance Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-258 || [[Tech Support Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-259 || [[Telemarketing Scam]] || 8 || TTP | |||
|- | |||
| CAT-2022-260 || [[Virtual Kidnapping]] || 8 || TTP | |||
|- | |||
| CAT-2022-261 || [[Virus Hoax]] || 8 || TTP | |||
|- | |||
| CAT-2022-262 || [[Deepfake Social Engineering]] || 8 || TTP | |||
|- | |||
| CAT-2022-263 || [[Synthetic Media Social Engineering]] || 8 || TTP | |||
|- | |||
| CAT-2022-264 || [[eWhoring]] || 8 || TTP | |||
|- | |||
| CAT-2022-265 || [[Jolly Roger Bot]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-266 || [[Fear]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-267 || [[Need & Greed Attack]] || 8 || Exploit | |||
|- | |||
| CAT-2022-268 || [[Need]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-269 || [[Neoteny]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-270 || [[Operant Conditioning]] || 8 || Exploit | |||
|- | |||
| CAT-2022-271 || [[Accomplished Introduction]] || 8 || TTP | |||
|- | |||
| CAT-2022-272 || [[Active Indicator Probe]] || 8 || TTP | |||
|- | |||
| CAT-2022-273 || [[Anchor (NLP Technique)]] || 8 || TTP | |||
|- | |||
| CAT-2022-274 || [[Baiting (Trolling)]] || 8 || TTP | |||
|- | |||
| CAT-2022-275 || [[Brushing ]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-276 || [[Buscador]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-277 || [[Cold Reading]] || 8 || TTP | |||
|- | |||
| CAT-2022-278 || [[Conversational Threading]] || 8 || TTP | |||
|- | |||
| CAT-2022-279 || [[Deception-in-Depth]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-280 || [[Double Switch]] || 8, 9 || TTP | |||
|- | |||
| CAT-2022-281 || [[Eject with Explanation]] || 8 || TTP | |||
|- | |||
| CAT-2022-282 || [[False Flag]] || 8 || TTP | |||
|- | |||
| CAT-2022-283 || [[False Time Constraint]] || 8 || TTP | |||
|- | |||
| CAT-2022-284 || [[Firehose of Falsehood]] || 8 || TTP | |||
|- | |||
| CAT-2022-285 || [[Forcing]] || 8 || Exploit | |||
|- | |||
| CAT-2022-286 || [[Functional Opener]] || 8 || TTP | |||
|- | |||
| CAT-2022-287 || [[Honey Channels]] || 8 || TTP | |||
|- | |||
| CAT-2022-288 || [[Hot Reading]] || 8 || TTP | |||
|- | |||
| CAT-2022-289 || [[Ice Breaker]] || 8 || TTP | |||
|- | |||
| CAT-2022-290 || [[Journobaiting]] || 8 || TTP | |||
|- | |||
| CAT-2022-291 || [[Leading Question]] || 8 || TTP | |||
|- | |||
| CAT-2022-292 || [[Maltego]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-293 || [[Micro Expression]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-294 || [[Mirroring]] || 8 || TTP | |||
|- | |||
| CAT-2022-295 || [[Multi-Channel Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-296 || [[Negging]] || 8 || TTP | |||
|- | |||
| CAT-2022-297 || [[Open-Ended Question]] || 8 || TTP | |||
|- | |||
| CAT-2022-298 || [[Pendant Anchoring]] || 8 || TTP | |||
|- | |||
| CAT-2022-299 || [[Preloading]] || 8 || TTP | |||
|- | |||
| CAT-2022-300 || [[Prop]] || 8 || TTP | |||
|- | |||
| CAT-2022-301 || [[Reframing]] || 8 || TTP | |||
|- | |||
| CAT-2022-302 || [[Sandbagging]] || 8 || TTP | |||
|- | |||
| CAT-2022-303 || [[Slander Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-304 || [[Social Engineering Toolkit]] || 8 || Tool / TTP | |||
|- | |||
| CAT-2022-305 || [[Tainted Leak]] || 8 || TTP | |||
|- | |||
| CAT-2022-306 || [[Trance-Words]] || 8 || TTP | |||
|- | |||
| CAT-2022-307 || [[Venue Change]] || 8 || TTP | |||
|- | |||
| CAT-2022-308 || [[Whorfian Attack]] || 8 || Exploit | |||
|- | |||
| CAT-2022-309 || [[Wing]] || 8 || TTP | |||
|- | |||
| CAT-2022-310 || [[Yes-Ladder]] || 8 || TTP | |||
|- | |||
| CAT-2022-311 || [[Compliance-Ladder]] || 8 || TTP | |||
|- | |||
| CAT-2022-312 || [[Incrementalism]] || 8, 9 || Exploit | |||
|- | |||
| CAT-2022-313 || [[Zone Flooding]] || 8 || TTP | |||
|- | |||
| CAT-2022-314 || [[Reflexive Control]] || 8 || TTP | |||
|- | |||
| CAT-2022-315 || [[Maskarovka]] || 8 || TTP | |||
|- | |||
| CAT-2022-316 || [[Network Ambiance Attack]] || 8 || TTP | |||
|- | |||
| CAT-2022-317 || [[Chain-Of-Throught Manipulation ]] || 7 || TTP | |||
|- | |||
| CAT-2022-318 || [[Culture Jamming]] || 8 || TTP | |||
|- | |||
| CAT-2022-319 || [[Emoji Injection]] || 7, 8 || TTP | |||
|- | |||
| CAT-2022-320 || [[Excessive Agency]] || 8 || Vulnerability | |||
|- | |||
| CAT-2022-321 || [[Impulsivity]] || 8 || Vulnerability | |||
|- | |||
| CAT-2023-001 || [[Overreliance on Automation]] || 8 || Vulnerability | |||
|- | |||
| CAT-2023-002 || [[Prompt Injection]] || 7 || TTP | |||
|- | |||
| CAT-2023-003 || [[Sensitive Information Disclosure (by User)]] || 8 || Vulnerability | |||
|- | |||
| CAT-2023-004 || [[Suffix Injection]] || 7 || TTP | |||
|- | |||
| CAT-2023-005 || [[Training Data Poisoning]] || 7 || Exploit | |||
|- | |||
| CAT-2023-006 || [[Campbell’s Law]] || 9 || Vulnerability | |||
|- | |||
| CAT-2023-007 || [[Training Data Poisoning Attack]] || 7 || TTP | |||
|- | |||
| CAT-2023-008 || [[Trigger Based Attack]] || 7 || TTP | |||
|- | |||
| CAT-2023-009 || [[Backdoor Attacks]] || 7 || TTP | |||
|- | |||
| CAT-2023-010 || [[Input Manipulation Attack]] || 7 || TTP | |||
|- | |||
| CAT-2023-011 || [[Evasion Attacks]] || 7 || TTP | |||
|- | |||
| CAT-2023-012 || [[Adversarial Examples]] || 7 || Exploit | |||
|- | |||
| CAT-2023-013 || [[Membership Inference Attack]] || 7 || Exploit | |||
|- | |||
| CAT-2023-014 || [[Model Inversion Attack]] || 7 || Exploit | |||
|- | |||
| CAT-2023-015 || [[Data Reconstruction]] || 7 || Exploit | |||
|- | |||
| CAT-2023-016 || [[Model Theft]] || 7 || TTP | |||
|- | |||
| CAT-2023-017 || [[Model Extraction Attacks]] || 7 || TTP | |||
|- | |||
| CAT-2023-018 || [[Repeated Exposure]] || 8 || Exploit | |||
|- | |||
| CAT-2024- || [[Positive Test Strategy]] || 8 || Vulnerability | |||
|- | |||
| CAT-2024- || [[Psychological Chuting]] || 8 || Exploit | |||
|- | |||
| CAT-2024-001 || [[Evil Eve Attack]] || 8 || TTP | |||
|- | |||
| CAT-2024-002 || [[Sleeper Agent Attack]] || 7 or 8 || TTP | |||
|- | |||
| CAT-2024-003 || [[False Feedback Injection]] || 7 || TTP | |||
|- | |||
| CAT-2024-004 || [[Stroop Test]] || 8 || TTP | |||
|- | |||
| CAT-2024-005 || [[Perjury Trap]] || 8, 10 || TTP | |||
|- | |||
| CAT-2024-006 || [[Regulatory Capture]] || 10 || Exploit | |||
|- | |||
| CAT-2024-007 || [[Need to Correct (Errors, Criticism, etc.)]] || 8 || Vulnerability | |||
|- | |||
|} |
Revision as of 23:43, 27 July 2024
CAT ID | CAT Name | Category | Layer |
---|---|---|---|
CAT-2021-001 | High Openess | 8 | Vulnerability |
CAT-2021-002 | High Conscientiousness | 8 | Vulnerability |
CAT-2021-003 | High Extraversion | 8 | Vulnerability |
CAT-2021-004 | High Agreeableness | 8 | Vulnerability |
CAT-2021-005 | High Neuroticism | 8 | Vulnerability |
CAT-2021-006 | Authority (Invocation of) | 8 | Exploit |
CAT-2021-006 | Low Openess (Closed to experience) | 8 | Vulnerability |
CAT-2021-007 | Low Conscientiousness | 8 | Vulnerability |
CAT-2021-007 | Reciprocation (Invoking) | 8 | Exploit |
CAT-2021-008 | Low Extraversion (Introverted) | 8 | Vulnerability |
CAT-2021-009 | Low Agreeableness (Disagreeable) | 8 | Vulnerability |
CAT-2021-010 | Excitement (Appeal to) | 8 | Exploit |
CAT-2022-001 | Fogg Model of Behavior | 8 | Tool / TTP |
CAT-2022-002 | Forcing Function | 8 | TTP |
CAT-2022-003 | Nudging | 8 | TTP |
CAT-2022-004 | Addictive Technology | 8 | TTP |
CAT-2022-005 | Bait and Switch | 8 | TTP |
CAT-2022-006 | Click-Bait | 8 | TTP |
CAT-2022-007 | Confirmshaming | 8 | TTP |
CAT-2022-008 | Dark Design Patterns | 8 | TTP |
CAT-2022-009 | Disguised Ads | 8 | TTP |
CAT-2022-010 | Forced Continuity | 8 | TTP |
CAT-2022-011 | Friend Spam | 8 | TTP |
CAT-2022-012 | Hidden Costs | 8 | TTP |
CAT-2022-013 | Malvertisement | 8 | TTP |
CAT-2022-014 | Misdirection - Distraction | 8 | Exploit |
CAT-2022-015 | Mouse-Trapping | 8 | TTP |
CAT-2022-016 | Persuasive Technology | 8 | TTP |
CAT-2022-017 | Price Comparison Prevention | 8 | TTP |
CAT-2022-018 | Privacy Zuckering | 8 | TTP |
CAT-2022-019 | Roach Motel | 8 | TTP |
CAT-2022-020 | Scareware | 8 | TTP |
CAT-2022-021 | Sneak into Basket | 8 | TTP |
CAT-2022-022 | Spam | 8 | TTP |
CAT-2022-023 | Trick Questions | 8 | TTP |
CAT-2022-024 | Zucked | 8 | TTP |
CAT-2022-025 | Brandjacking | 8 | TTP |
CAT-2022-026 | Familiarity | 8 | Vulnerability |
CAT-2022-027 | Fluency Effect | 8 | Vulnerability |
CAT-2022-028 | Lateral Phishing | 8 | TTP |
CAT-2022-029 | Social Phishing | 8 | TTP |
CAT-2022-030 | Typosquatting | 8 | TTP |
CAT-2022-031 | Water Hole Attack | 8 | TTP |
CAT-2022-032 | Wi-Fi Evil Twin | 8 | TTP |
CAT-2022-033 | Wikijacking | 8 | TTP |
CAT-2022-034 | Actor-Observer Bias | 8 | Vulnerability |
CAT-2022-035 | Ambient Tactical Deception Attacks | 8 | TTP |
CAT-2022-036 | Ambiguous Self Induced Disinformation Attack | 8 | TTP |
CAT-2022-037 | Anchoring | 8 | Vulnerability |
CAT-2022-038 | Availability Heuristic | 8 | Vulnerability |
CAT-2022-039 | Barnum Statement | 8 | TTP |
CAT-2022-040 | Base Rate Neglect | 8 | Vulnerability |
CAT-2022-041 | Belief Bias | 8 | Vulnerability |
CAT-2022-042 | Ben Franklin Effect | 8 | Exploit |
CAT-2022-043 | Classical Conditioning | 8 | Exploit |
CAT-2022-044 | Clustering Illusion | 8 | Vulnerability |
CAT-2022-045 | Cognitive Deception | 8 | Exploit |
CAT-2022-046 | Cognitive Dissonance | 8 | Vulnerability |
CAT-2022-047 | Cognitive Malware | 8 | Exploit |
CAT-2022-048 | Confirmation Bias | 8 | Vulnerability |
CAT-2022-049 | Context Dependent Memory | 8 | Vulnerability |
CAT-2022-050 | Decision Fatigue | 8 | Vulnerability |
CAT-2022-051 | Decoy Effect | 8 | Exploit |
CAT-2022-052 | Default Bias | 8 | Vulnerability |
CAT-2022-053 | Dread Aversion | 8 | Vulnerability |
CAT-2022-054 | Dunning–Kruger Effect | 8 | Vulnerability |
CAT-2022-055 | Ear Worm | 8 | Exploit |
CAT-2022-056 | Egocentric Bias | 8 | Vulnerability |
CAT-2022-057 | Endowment Effect | 8 | Vulnerability |
CAT-2022-058 | False Consensus Effect | 8 | Vulnerability |
CAT-2022-059 | False Memory | 8 | Vulnerability |
CAT-2022-060 | False Uniqueness Bias | 8 | Vulnerability |
CAT-2022-061 | Fear of Missing Out | 8 | Exploit |
CAT-2022-062 | Foot-In-the-Door Technique | 8 | TTP |
CAT-2022-063 | Framing Effect | 8 | Vulnerability |
CAT-2022-064 | Frequency Illusion | 8 | Vulnerability |
CAT-2022-065 | Functional Fixedness | 8 | Vulnerability |
CAT-2022-066 | Fundamental Attribution Error | 8 | Vulnerability |
CAT-2022-067 | Gambler's Fallacy | 8 | Vulnerability |
CAT-2022-068 | Halo Effect | 8 | Vulnerability |
CAT-2022-069 | Hindsight Bias | 8 | Vulnerability |
CAT-2022-070 | Hyperbolic Discounting | 8 | Vulnerability |
CAT-2022-071 | IKEA Effect | 8 | Vulnerability |
CAT-2022-072 | Illusion of Control | 8 | Vulnerability |
CAT-2022-073 | Illusory Correlation | 8 | Vulnerability |
CAT-2022-074 | Innoculation (Effect) | 8 | Exploit |
CAT-2022-075 | Involuntary Memory | 8 | Vulnerability |
CAT-2022-076 | Involuntary Musical Imagery | 8 | Exploit |
CAT-2022-077 | Leveling and Sharpening | 8 | Vulnerability |
CAT-2022-078 | Levels-of-Processing Effect | 8 | Vulnerability |
CAT-2022-079 | Loss Aversion | 8 | Vulnerability |
CAT-2022-080 | Magnetizer - Self-Relevance | 8 | Exploit |
CAT-2022-081 | Malware-Induced Misperception Attack | 8 | TTP |
CAT-2022-082 | Mental Set | 8 | Vulnerability |
CAT-2022-083 | Mood-Congruent Memory | 8 | Vulnerability |
CAT-2022-084 | Mother Teresa Effect | 8 | Vulnerability |
CAT-2022-085 | Mystery Magnetizer | 8 | Exploit |
CAT-2022-086 | Narrative Influence | 8 | Exploit |
CAT-2022-087 | Negativity Bias | 8 | Vulnerability |
CAT-2022-088 | Neglect of Probability | 8 | Vulnerability |
CAT-2022-089 | Next-In-Line-Effect | 8 | Vulnerability |
CAT-2022-090 | Omission Bias | 8 | Vulnerability |
CAT-2022-091 | Optimism Bias | 8 | Vulnerability |
CAT-2022-092 | Overconfidence | 8 | Vulnerability |
CAT-2022-093 | Peak-End Rule | 8 | Vulnerability |
CAT-2022-094 | Planning Fallacy | 8 | Vulnerability |
CAT-2022-095 | Pre-Suasion | 8 | Exploit |
CAT-2022-096 | Probability Blindness | 8 | Vulnerability |
CAT-2022-097 | Relativism | 8 | Vulnerability |
CAT-2022-098 | Risk Homeostasis | 8 | Vulnerability |
CAT-2022-099 | Satisficing | 8 | Vulnerability |
CAT-2022-100 | Search Engine Manipulation Effect | 8 | Exploit |
CAT-2022-101 | Self-Relevance Effect | 8 | Vulnerability |
CAT-2022-102 | Self-Serving Bias | 8 | Vulnerability |
CAT-2022-103 | Serial Position Effect | 8 | Vulnerability |
CAT-2022-104 | Source Monitoring Error | 8 | Vulnerability |
CAT-2022-105 | Spacing Effect | 8 | Exploit |
CAT-2022-106 | Spotlight Effect | 8 | Vulnerability |
CAT-2022-107 | Status Quo Bias | 8 | Vulnerability |
CAT-2022-108 | Straw Man (argument) | 8 | TTP |
CAT-2022-109 | Subjective Validation | 8 | Vulnerability |
CAT-2022-110 | Suggestion | 8 | TTP |
CAT-2022-111 | Unfinished (Magnetizer) | 8 | Exploit |
CAT-2022-112 | von Restorff Effect | 8 | Vulnerability |
CAT-2022-113 | Whorfianism | 8 | Vulnerability |
CAT-2022-114 | Zeigarnik Effect | 8 | Vulnerability |
CAT-2022-115 | Curiosity | 8 | Vulnerability |
CAT-2022-116 | Configuration Error (Mistake) | 8 | Vulnerability |
CAT-2022-117 | Disposal Errors | 8 | Vulnerability |
CAT-2022-118 | Leakage Errors | 8 | Vulnerability |
CAT-2022-119 | Loss Error | 8 | Vulnerability |
CAT-2022-120 | Mis-Addressed Email | 8 | Vulnerability |
CAT-2022-121 | Transmission Error | 8 | Vulnerability |
CAT-2022-122 | Astro-Turfing | 8 | TTP |
CAT-2022-123 | Clone Phishing | 8 | TTP |
CAT-2022-124 | Cognitive Malware Injection | 8 | TTP |
CAT-2022-125 | Gaslighting | 8 | TTP |
CAT-2022-126 | Greenwashing | 8 | TTP |
CAT-2022-127 | Honey Phish | 8 | TTP |
CAT-2022-128 | Honey Pot | 8 | TTP |
CAT-2022-129 | Honey Token | 8 | TTP |
CAT-2022-130 | Honey Trap | 8 | TTP |
CAT-2022-131 | Impersonation Scam | 8 | TTP |
CAT-2022-132 | Phishing | 8 | TTP |
CAT-2022-133 | Pretext - Pretexting | 8 | TTP |
CAT-2022-134 | Reverse Social Engineering | 8 | TTP |
CAT-2022-135 | Scambaiting | 8 | TTP |
CAT-2022-136 | Semantic Attack | 7, 8, or 9 | Exploit |
CAT-2022-137 | Shill | 8 | TTP |
CAT-2022-138 | Shilling Attack | 9 | TTP |
CAT-2022-139 | SMSishing | 8 | TTP |
CAT-2022-140 | Sock-Puppetry | 8 | TTP |
CAT-2022-141 | Spear Phishing | 8 | TTP |
CAT-2022-142 | Vish - Vishing | 8 | TTP |
CAT-2022-143 | Data Vulnerability | 8 | Vulnerability |
CAT-2022-144 | Inference Attack | 7,8,9,10 | Exploit |
CAT-2022-145 | Pluridentity Attack | 7,8,9,10 | Exploit |
CAT-2022-146 | Sniper Ad Targeting | 8 | TTP |
CAT-2022-147 | Tailored Messaging | 8 | TTP |
CAT-2022-148 | Whaling | 8 | TTP |
CAT-2022-149 | Change of Scene | 8 | TTP |
CAT-2022-150 | Complaining (Tendency to) | 8 | Vulnerability |
CAT-2022-151 | Criticism | 8 | TTP |
CAT-2022-152 | Deliberate False Statement | 8 | TTP |
CAT-2022-153 | Direct Approach | 8 | TTP |
CAT-2022-154 | Disbelief | 8 | TTP |
CAT-2022-155 | Elicitation (of Information) | 8 | TTP |
CAT-2022-156 | Emotional Approach | 8 | TTP |
CAT-2022-157 | Establish Your Identity | 8 | TTP |
CAT-2022-158 | Ethical Dilemma | 8 | TTP |
CAT-2022-159 | Fear-Down Approach | 8 | TTP |
CAT-2022-160 | Fear-Up Approach | 8 | TTP |
CAT-2022-161 | File and Dossier | 8 | TTP |
CAT-2022-162 | Flattery | 8 | TTP |
CAT-2022-163 | Futility | 8 | TTP |
CAT-2022-164 | Hour Glass Method | 8 | TTP |
CAT-2022-165 | Incentive Approach | 8 | TTP |
CAT-2022-166 | Naïve Mentality | 8 | TTP |
CAT-2022-167 | Neuro-Linguistic Programming | 8 | Exploit |
CAT-2022-168 | Oblique Reference | 8 | TTP |
CAT-2022-169 | Pride and Ego Approach | 8 | TTP |
CAT-2022-170 | Provocative Statement | 8 | TTP |
CAT-2022-171 | Quid Pro Quo | 8 | TTP |
CAT-2022-172 | Rapid Fire | 8 | TTP |
CAT-2022-173 | Repeat-a-Word | 8 | TTP |
CAT-2022-174 | Repetition (Tactic) | 8 | TTP |
CAT-2022-175 | Rubber-Hose Cryptanalysis | 8 | Exploit |
CAT-2022-176 | Secret Knowledge | 8 | TTP |
CAT-2022-177 | Sensory Matching | 8 | TTP |
CAT-2022-178 | Silence | 8 | TTP |
CAT-2022-179 | We Know All | 8 | TTP |
CAT-2022-180 | File Masquerading | 8, 9 | TTP |
CAT-2022-181 | Ignorance | 8 | Vulnerability |
CAT-2022-182 | Traitor Tracing | 8 | TTP |
CAT-2022-183 | Clickjacking | 8 | TTP |
CAT-2022-184 | IDN Homograph Attack | 8 | TTP |
CAT-2022-185 | Like Jacking | 8 | TTP |
CAT-2022-186 | Perceptual Deception | 8 | Vulnerability |
CAT-2022-187 | Social Jacking | 8 | TTP |
CAT-2022-188 | Video Puppetry | 8 | TTP |
CAT-2022-189 | Automaticity | 8 | Vulnerability |
CAT-2022-190 | Boredom | 8 | Vulnerability |
CAT-2022-191 | Distracted Approach (Distraction) | 8 | TTP |
CAT-2022-192 | Focusing Effect | 8 | Vulnerability |
CAT-2022-193 | Gray Signal Attacks | 8 | TTP |
CAT-2022-194 | Human Buffer Overflow | 8 | Exploit |
CAT-2022-195 | Noise Injection | 8, 9 | TTP |
CAT-2022-196 | Prevalence Paradox | 8 | Vulnerability |
CAT-2022-197 | Tab-Napping | 8 | TTP |
CAT-2022-198 | Interoceptive Bias | 8 | Vulnerability |
CAT-2022-199 | P300 Guilty Knowledge Test | 8 | TTP |
CAT-2022-200 | Sonic Area Denial | 8 | TTP |
CAT-2022-201 | Strobe Attack | 8 | TTP |
CAT-2022-202 | Zombification | 8 | Exploit |
CAT-2022-203 | Ingroup Bias | 8 | Vulnerability |
CAT-2022-204 | Mass Psychogenic Illness | 8 | Vulnerability |
CAT-2022-205 | Network Manipulated Affect | 8 | Vulnerability |
CAT-2022-206 | Outgroup Homogeneity Bias | 8 | Vulnerability |
CAT-2022-207 | Social Desirability Bias | 8 | Vulnerability |
CAT-2022-208 | Stereotyping | 8 | Vulnerability |
CAT-2022-209 | Streisand Effect | 8 | Vulnerability |
CAT-2022-210 | Sympathy | 8 | Vulnerability |
CAT-2022-211 | Trevor's Axiom | 8 | Exploit |
CAT-2022-212 | Trolling | 8 | TTP |
CAT-2022-213 | Wall Banging | 8 | TTP |
CAT-2022-214 | Network Affect Contagion | 7, 8 | Vulnerability |
CAT-2022-215 | Assistance (Need to Provide) | 8 | Vulnerability |
CAT-2022-216 | Authority (Deference to) | 8 | Vulnerability |
CAT-2022-217 | Bandwagon Effect | 8 | Exploit |
CAT-2022-218 | Commitment-Consistency | 8 | Vulnerability |
CAT-2022-219 | Door-in-the-Face Technique | 8 | TTP |
CAT-2022-220 | Liking | 8 | Vulnerability |
CAT-2022-221 | Party Crashing | 8 | TTP |
CAT-2022-222 | Pawn - Pivot | 8 | TTP |
CAT-2022-223 | Reciprocity (Need for) | 8 | Vulnerability |
CAT-2022-224 | Reversing Authority | 8 | TTP |
CAT-2022-225 | Scarcity | 8 | Vulnerability |
CAT-2022-226 | Social Proof | 8 | Vulnerability |
CAT-2022-227 | Unity | 8 | Vulnerability |
CAT-2022-228 | Spectrum of Allies | 8 | TTP |
CAT-2022-229 | Cybersquatting | 9 | TTP |
CAT-2022-230 | Escalation Attack | 8, 9 | TTP |
CAT-2022-231 | Shadow AP | 9 | Vulnerability |
CAT-2022-232 | Shadow IT | 9 | Vulnerability |
CAT-2022-233 | Shadow Security | 9 | Vulnerability |
CAT-2022-234 | Supply Chain Attack | 9 | Exploit |
CAT-2022-235 | Lawfare | 10 | Exploit |
CAT-2022-236 | Legal Loophole | 10 | Vulnerability |
CAT-2022-237 | Patent Trolling | 10 | TTP |
CAT-2022-238 | Strategic Lawsuit Against Public Participation | 10 | TTP |
CAT-2022-239 | Spamigation | 10 | TTP |
CAT-2022-240 | Robo Calling | 8 | TTP |
CAT-2022-241 | Acoustic Attack | 8 | TTP |
CAT-2022-242 | Dolphin Attack | 8 | Exploit |
CAT-2022-243 | Robot Social Engineering | 8 | TTP |
CAT-2022-244 | Assistance Ploy | 8 | Exploit |
CAT-2022-245 | Baiting - Drop | 8 | TTP |
CAT-2022-246 | Dumpster Diving | 8, 9 | TTP |
CAT-2022-247 | Shoulder Surfing | 8 | TTP |
CAT-2022-248 | Snail Mail Attack | 8 | TTP |
CAT-2022-249 | Tailgating | 8 | TTP |
CAT-2022-250 | War Shipping | 8, 9 | TTP |
CAT-2022-251 | Advance Fee Scam | 8 | TTP |
CAT-2022-252 | Business Email Compromise | 8, 9 | TTP |
CAT-2022-253 | Cat Fishing | 8 | TTP |
CAT-2022-254 | Crab Phishing | 8 | TTP |
CAT-2022-255 | Gift-Card Scam | 8 | TTP |
CAT-2022-256 | Hoax Virus | 8 | TTP |
CAT-2022-257 | Romance Scam | 8 | TTP |
CAT-2022-258 | Tech Support Scam | 8 | TTP |
CAT-2022-259 | Telemarketing Scam | 8 | TTP |
CAT-2022-260 | Virtual Kidnapping | 8 | TTP |
CAT-2022-261 | Virus Hoax | 8 | TTP |
CAT-2022-262 | Deepfake Social Engineering | 8 | TTP |
CAT-2022-263 | Synthetic Media Social Engineering | 8 | TTP |
CAT-2022-264 | eWhoring | 8 | TTP |
CAT-2022-265 | Jolly Roger Bot | 8 | Tool / TTP |
CAT-2022-266 | Fear | 8 | Vulnerability |
CAT-2022-267 | Need & Greed Attack | 8 | Exploit |
CAT-2022-268 | Need | 8 | Vulnerability |
CAT-2022-269 | Neoteny | 8 | Vulnerability |
CAT-2022-270 | Operant Conditioning | 8 | Exploit |
CAT-2022-271 | Accomplished Introduction | 8 | TTP |
CAT-2022-272 | Active Indicator Probe | 8 | TTP |
CAT-2022-273 | Anchor (NLP Technique) | 8 | TTP |
CAT-2022-274 | Baiting (Trolling) | 8 | TTP |
CAT-2022-275 | Brushing | 8, 9 | TTP |
CAT-2022-276 | Buscador | 8 | Tool / TTP |
CAT-2022-277 | Cold Reading | 8 | TTP |
CAT-2022-278 | Conversational Threading | 8 | TTP |
CAT-2022-279 | Deception-in-Depth | 8, 9 | TTP |
CAT-2022-280 | Double Switch | 8, 9 | TTP |
CAT-2022-281 | Eject with Explanation | 8 | TTP |
CAT-2022-282 | False Flag | 8 | TTP |
CAT-2022-283 | False Time Constraint | 8 | TTP |
CAT-2022-284 | Firehose of Falsehood | 8 | TTP |
CAT-2022-285 | Forcing | 8 | Exploit |
CAT-2022-286 | Functional Opener | 8 | TTP |
CAT-2022-287 | Honey Channels | 8 | TTP |
CAT-2022-288 | Hot Reading | 8 | TTP |
CAT-2022-289 | Ice Breaker | 8 | TTP |
CAT-2022-290 | Journobaiting | 8 | TTP |
CAT-2022-291 | Leading Question | 8 | TTP |
CAT-2022-292 | Maltego | 8 | Tool / TTP |
CAT-2022-293 | Micro Expression | 8 | Vulnerability |
CAT-2022-294 | Mirroring | 8 | TTP |
CAT-2022-295 | Multi-Channel Attack | 8 | TTP |
CAT-2022-296 | Negging | 8 | TTP |
CAT-2022-297 | Open-Ended Question | 8 | TTP |
CAT-2022-298 | Pendant Anchoring | 8 | TTP |
CAT-2022-299 | Preloading | 8 | TTP |
CAT-2022-300 | Prop | 8 | TTP |
CAT-2022-301 | Reframing | 8 | TTP |
CAT-2022-302 | Sandbagging | 8 | TTP |
CAT-2022-303 | Slander Attack | 8 | TTP |
CAT-2022-304 | Social Engineering Toolkit | 8 | Tool / TTP |
CAT-2022-305 | Tainted Leak | 8 | TTP |
CAT-2022-306 | Trance-Words | 8 | TTP |
CAT-2022-307 | Venue Change | 8 | TTP |
CAT-2022-308 | Whorfian Attack | 8 | Exploit |
CAT-2022-309 | Wing | 8 | TTP |
CAT-2022-310 | Yes-Ladder | 8 | TTP |
CAT-2022-311 | Compliance-Ladder | 8 | TTP |
CAT-2022-312 | Incrementalism | 8, 9 | Exploit |
CAT-2022-313 | Zone Flooding | 8 | TTP |
CAT-2022-314 | Reflexive Control | 8 | TTP |
CAT-2022-315 | Maskarovka | 8 | TTP |
CAT-2022-316 | Network Ambiance Attack | 8 | TTP |
CAT-2022-317 | Chain-Of-Throught Manipulation | 7 | TTP |
CAT-2022-318 | Culture Jamming | 8 | TTP |
CAT-2022-319 | Emoji Injection | 7, 8 | TTP |
CAT-2022-320 | Excessive Agency | 8 | Vulnerability |
CAT-2022-321 | Impulsivity | 8 | Vulnerability |
CAT-2023-001 | Overreliance on Automation | 8 | Vulnerability |
CAT-2023-002 | Prompt Injection | 7 | TTP |
CAT-2023-003 | Sensitive Information Disclosure (by User) | 8 | Vulnerability |
CAT-2023-004 | Suffix Injection | 7 | TTP |
CAT-2023-005 | Training Data Poisoning | 7 | Exploit |
CAT-2023-006 | Campbell’s Law | 9 | Vulnerability |
CAT-2023-007 | Training Data Poisoning Attack | 7 | TTP |
CAT-2023-008 | Trigger Based Attack | 7 | TTP |
CAT-2023-009 | Backdoor Attacks | 7 | TTP |
CAT-2023-010 | Input Manipulation Attack | 7 | TTP |
CAT-2023-011 | Evasion Attacks | 7 | TTP |
CAT-2023-012 | Adversarial Examples | 7 | Exploit |
CAT-2023-013 | Membership Inference Attack | 7 | Exploit |
CAT-2023-014 | Model Inversion Attack | 7 | Exploit |
CAT-2023-015 | Data Reconstruction | 7 | Exploit |
CAT-2023-016 | Model Theft | 7 | TTP |
CAT-2023-017 | Model Extraction Attacks | 7 | TTP |
CAT-2023-018 | Repeated Exposure | 8 | Exploit |
CAT-2024- | Positive Test Strategy | 8 | Vulnerability |
CAT-2024- | Psychological Chuting | 8 | Exploit |
CAT-2024-001 | Evil Eve Attack | 8 | TTP |
CAT-2024-002 | Sleeper Agent Attack | 7 or 8 | TTP |
CAT-2024-003 | False Feedback Injection | 7 | TTP |
CAT-2024-004 | Stroop Test | 8 | TTP |
CAT-2024-005 | Perjury Trap | 8, 10 | TTP |
CAT-2024-006 | Regulatory Capture | 10 | Exploit |
CAT-2024-007 | Need to Correct (Errors, Criticism, etc.) | 8 | Vulnerability |