Identify business relationships
Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. 
Similar Techniques by Tactic
|People Information Gathering||Identify business relationships|
Detectable by Common Defenses (Yes/No/Partial): No
Explanation: Exception to the rule is if the adversary tips off the target that others have been asking about the relationship with them.
Difficulty for the Adversary
Easy for the Adversary (Yes/No): Yes
Explanation: Requires an intensive process. In some industries, business relationships may be public in order to generate business, but this is not the case for all industries and all relationships.
- Thor Olavsrud. (2014, September 2). 11 Steps Attackers Took to Crack Target. Retrieved March 5, 2017.