Lateral Phishing: Difference between revisions

From Cognitive Attack Taxonomy
Created page with "== '''Lateral Phishing ''' == '''Short Description:''' Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target. <br> '''CAT ID:''' CAT-2022-028 <br> '''Layer:''' 8 <br> '''Operational Scale:''' Tactical <br> '''Level of Maturity:''' Observed in the Wild <br> '''Category:''' TTP <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Closely Related Conc..."
 
 
Line 15: Line 15:
'''Subcategory:'''  <br>
'''Subcategory:'''  <br>


'''Also Known As:''' <br>
'''Also Known As:''' Pivoting <br>


== '''Description:''' ==
== '''Description:''' ==

Latest revision as of 17:18, 13 January 2025

Lateral Phishing

Short Description: Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target.

CAT ID: CAT-2022-028

Layer: 8

Operational Scale: Tactical

Level of Maturity: Observed in the Wild

Category: TTP

Subcategory:

Also Known As: Pivoting

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Exploiting a low-value (ie: low security posture) target inorder to "pivot" to a higher value target by using the compromised account from "inside" the organization. So that the attacker is using an "internal" email address.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: