CAPEC 504 Task Impersonation

Stable Standard Medium Risk
Severity High

Description

An adversary, through a previously installed malicious application, impersonates an expected or routine task in an attempt to steal sensitive information or leverage a user's privileges.

Attack Execution Flow

2

Mitigations

1

Consequences

Indicators

1

Relationships

Related ATT&CK Techniques

1

Resources Required

2