Impersonation
Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Establ...
BY SOURCE
PROCEDURES (47)
Auto-extracted: 16 detections for email security
Auto-extracted: 15 detections for service
Auto-extracted: 12 detections for email
Auto-extracted: 11 detections for impersonat
Auto-extracted: 10 detections for suspicious
Auto-extracted: 9 detections for network connection monitoring
Auto-extracted: 8 detections for email
Auto-extracted: 8 detections for impersonat
Auto-extracted: 6 detections for attachment
Auto-extracted: 6 detections for suspicious
Auto-extracted: 6 detections for authentication monitoring
Auto-extracted: 5 detections for credential
Auto-extracted: 4 detections for general monitoring
Auto-extracted: 4 detections for impersonat
Auto-extracted: 4 detections for credential
Auto-extracted: 4 detections for suspicious
Auto-extracted: 3 detections for phish
Auto-extracted: 3 detections for remote
Auto-extracted: 3 detections for bypass
Auto-extracted: 2 detections for attachment
Auto-extracted: 2 detections for credential
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for attachment
Auto-extracted: 2 detections for http
Auto-extracted: 2 detections for cloud
Auto-extracted: 2 detections for aws
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for attachment
Auto-extracted: 1 detections for attachment
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for office
Auto-extracted: 1 detections for phish
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for remote