EXPLORE
← Back to Explore
T1684.001

Impersonation

Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Establ...

LinuxmacOSOffice SuiteSaaSWindows
0
Detections
0
Sources
15
Threat Actors

DETECTIONS (0)