CAPEC-424: Influence Perception of Consensus or Social Proof |
Description The adversary influences the target's actions by leveraging the inherent human nature to assume behavior of others is appropriate. In situations of uncertainty, people tend to behave in ways they see others behaving. The adversary convinces the target of adopting behavior or actions that is advantageous to the adversary. Likelihood Of Attack Typical Severity Prerequisites
| The adversary must have the means and knowledge of how to communicate with the target in some manner. |
Skills Required
[Level: Low] The adversary requires strong inter-personal and communication skills. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Confidentiality Integrity Availability | Other | |
Mitigations
| An organization should provide regular, robust cybersecurity training to its employees to prevent social engineering attacks. |
References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Methods_of_Attack, References, Related_Attack_Patterns, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2017-08-04 (Version 2.11) | Target Influence via Perception of Consensus or Social Proof | |
More information is available — Please select a different filter.
|