Identify business relationships

Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. [1]

ID: T1283

Tactic: Organizational Information Gathering

Version: 1.0

Similar Techniques by Tactic

People Information GatheringIdentify business relationships


Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Exception to the rule is if the adversary tips off the target that others have been asking about the relationship with them.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Requires an intensive process. In some industries, business relationships may be public in order to generate business, but this is not the case for all industries and all relationships.


  1. Thor Olavsrud. (2014, September 2). 11 Steps Attackers Took to Crack Target. Retrieved March 5, 2017.