Impersonation
| ID: | TAC-26 |
| Phase: | Defence Bypass |
Impersonation involves an adversary pretending to be someone else or a trusted entity to deceive business tools or the defensive tools into allowing access to applications, sites or information that they should not be allowed to access.