CAPEC-117 Interception

CAPEC ID: 117

CAPEC-117 Metadata

Likelihood of Attack

Low

Typical Severity

Medium

Overview

Summary

An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information (e.g., targeting data leaks), the adversary must actively position themself so as to observe explicit data channels (e.g. network traffic) and read the content. However, this attack differs from a Adversary-In-the-Middle (CAPEC-94) attack, as the adversary does not alter the content of the communications nor forward data to the intended recipient.

Prerequisites

The target must transmit data over a medium that is accessible to the adversary.

Potential Solutions / Mitigations

Leverage encryption to encode the transmission of data thus making it accessible only to authorized parties.

Related Weaknesses (CWE)

CWE ID Description
CWE-319 Cleartext Transmission of Sensitive Information

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.