Identify business relationships

Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploiting network trust relationship. [1]

ID: T1283
Sub-techniques:  No sub-techniques
Tactic: Organizational Information Gathering
Version: 1.0
Created: 14 December 2017
Last Modified: 17 October 2018

Similar Techniques by Tactic

Tactic Technique
People Information Gathering Identify business relationships


Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Exception to the rule is if the adversary tips off the target that others have been asking about the relationship with them.

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Requires an intensive process. In some industries, business relationships may be public in order to generate business, but this is not the case for all industries and all relationships.


  1. Thor Olavsrud. (2014, September 2). 11 Steps Attackers Took to Crack Target. Retrieved March 5, 2017.