Identify business relationships
Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. 
Tactic: Organizational Information Gathering
Similar Techniques by Tactic
|People Information Gathering||Identify business relationships|
DetectionDetectable by Common Defenses (Yes/No/Partial): No
Explanation: Exception to the rule is if the adversary tips off the target that others have been asking about the relationship with them.
Difficulty for the AdversaryEasy for the Adversary (Yes/No): Yes
Explanation: Requires an intensive process. In some industries, business relationships may be public in order to generate business, but this is not the case for all industries and all relationships.
- Thor Olavsrud. (2014, September 2). 11 Steps Attackers Took to Crack Target. Retrieved March 5, 2017.