CAPEC-406: Dumpster Diving |
Description An adversary cases an establishment and searches through trash bins, dumpsters, or areas where company information may have been accidentally discarded for information items which may be useful to the dumpster diver. The devastating nature of the items and/or information found can be anything from medical records, resumes, personal photos and emails, bank statements, account details or information about software, tech support logs and so much more, including hardware devices. By collecting this information an adversary may be able to learn important facts about the person or organization that play a role in helping the adversary in their attack. Typical Severity Prerequisites
| An adversary must have physical access to the dumpster or downstream processing facility. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Confidentiality | Other | |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (see
parent
) References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Description Summary, Related_Attack_Patterns | | 2018-07-31 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Related_Attack_Patterns | | 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-07-30 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2022-09-29 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | | Updated Description, Related_Attack_Patterns | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2017-08-04 (Version 2.11) | Social Information Gathering via Dumpster Diving | |
More information is available — Please select a different filter.
|