Action Spoofing |
Attack Pattern ID: 173 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Very High | Status: Draft |
Action Spoofing |
Attack Pattern ID: 173 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Very High | Status: Draft |
Summary
An attacker is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it downloads software. Attackers may perform this attack through social means, such as by simply convincing a victim to perform the action or relying on a user's natural inclination to do so, or through technical means, such as a clickjacking attack where a user sees one interface but is actually interacting with a second, invisible, interface.
The attacker must have enough control over a user's interface to present them with a decoy action as well as the actual malicious action. Simple versions of this attack can be performed using web pages requiring only that the attacker be able to host (or control) content that the user visits.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 156 | Spoofing | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 103 | Clickjacking | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.