| Home > CAPEC List > CAPEC-164: Mobile Phishing (Version 3.9) |
|
Term: Smishing
Term: MobPhishing
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 98 | Phishing |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Social Engineering |
| Mechanisms of Attack | Engage in Deceptive Interactions |
Obtain domain name and certificate to spoof legitimate site: This optional step can be used to help the adversary impersonate the legitimate site more convincingly. The adversary can use homograph or similar attacks to convince users that they are using the legitimate website. Note that this step is not required for phishing attacks, and many phishing attacks simply supply URLs containing an IP address and no SSL certificate.
| Techniques |
|---|
| Optionally obtain a domain name that visually looks similar to the legitimate site's domain name. An example is www.paypaI.com vs. www.paypal.com (the first one contains a capital i, instead of a lower case L) |
| Optionally obtain a legitimate SSL certificate for the new domain name. |
Explore legitimate website and create duplicate: An adversary creates a website (optionally at a URL that looks similar to the original URL) that closely resembles the website that they are trying to impersonate. That website will typically have a login form for the victim to put in their authentication credentials. There can be different variations on a theme here.
| Techniques |
|---|
| Use spidering software to get copy of web pages on legitimate site. |
| Manually save copies of required web pages from legitimate site. |
| Create new web pages that have the legitimate site's look and feel, but contain completely new content. |
Convince user to enter sensitive information on adversary's site.: An adversary sends a text message to the victim that has a call-to-action, in order to persuade the user into clicking the included link (which then takes the victim to the adversary's website) and logging in. The key is to get the victim to believe that the text message originates from a legitimate entity with which the victim does business and that the website pointed to by the URL in the text message is the legitimate website. A call-to-action will usually need to sound legitimate and urgent enough to prompt action from the user.
| Techniques |
|---|
| Send the user a message from a spoofed legitimate-looking mobile number that asks the user to click on the included link. |
Use stolen credentials to log into legitimate site: Once the adversary captures some sensitive information through phishing (login credentials, credit card information, etc.) the adversary can leverage this information. For instance, the adversary can use the victim's login credentials to log into their bank account and transfer money to an account of their choice.
| Techniques |
|---|
| Log in to the legitimate site using another user's supplied credentials |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality Access Control Authorization | Gain Privileges | |
Confidentiality | Read Data | |
Integrity | Modify Data |
| CWE-ID | Weakness Name |
|---|---|
| 451 | User Interface (UI) Misrepresentation of Critical Information |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2017年01月09日 (Version 2.9) | CAPEC Content Team | The MITRE Corporation | |
| Updated Alternate_Terms | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Status, Alternate_Terms, Consequences, Description, Example_Instances, Execution_Flow, Indicators, Likelihood_Of_Attack, Mitigations, Prerequisites, References, Skills_Required | |||
| 2022年02月22日 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated References | |||
| 2023年01月24日 (Version 3.9) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2017年01月09日 (Version 2.9) | Mobile Phishing (aka MobPhishing) | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||