Lateral Phishing: Difference between revisions
From Cognitive Attack Taxonomy
Created page with "== '''Lateral Phishing ''' == '''Short Description:''' Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target. <br> '''CAT ID:''' CAT-2022-028 <br> '''Layer:''' 8 <br> '''Operational Scale:''' Tactical <br> '''Level of Maturity:''' Observed in the Wild <br> '''Category:''' TTP <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Closely Related Conc..." |
|||
| Line 15: | Line 15: | ||
'''Subcategory:''' <br> | '''Subcategory:''' <br> | ||
'''Also Known As:''' | '''Also Known As:''' Pivoting <br> | ||
== '''Description:''' == | == '''Description:''' == | ||
Latest revision as of 17:18, 13 January 2025
Lateral Phishing
Short Description: Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target.
CAT ID: CAT-2022-028
Layer: 8
Operational Scale: Tactical
Level of Maturity: Observed in the Wild
Category: TTP
Subcategory:
Also Known As: Pivoting
Description:
Brief Description:
Closely Related Concepts:
Mechanism:
Multipliers:
Detailed Description: Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target by using the compromised account from "inside" the organization. So that the attacker is using an "internal" email address.
INTERACTIONS [VETs]:
Examples:
Use Case Example(s):
Example(s) From The Wild:
