This method is similar to piggybacking besides that the person remaining tailgated is unaware that they're being used by One more particular person. Certain adversaries tend to use specific approaches. The MITRE ATT&CK Framework catalogs info that correlates adversary teams to campaigns, so protection teams can better understand the adversaries https://cyberattack50504.blogscribble.com/26715962/about-cyber-attack-model