Impersonated Account Creation
| ID: | TEQ-108 | |
| Phase(s): | Attack Execution | |
| Tactic(s): | Account Creation | Account Enumeration |
The adversary uses stolen personal data to create an account impersonating another person's identity.
| ID: | TEQ-108 | |
| Phase(s): | Attack Execution | |
| Tactic(s): | Account Creation | Account Enumeration |
The adversary uses stolen personal data to create an account impersonating another person's identity.