{
	"id": "2f79d519-f0a1-44ea-87dc-90c6db5bde01",
	"created_at": "2026-04-06T00:15:35.394837Z",
	"updated_at": "2026-04-10T03:21:58.921757Z",
	"deleted_at": null,
	"sha1_hash": "fb0786cf6a18ffadeb134c41da3a1c6028617378",
	"title": "CAPEC-572: Artificially Inflate File Sizes (Version 3.9)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41685,
	"plain_text": "CAPEC-572: Artificially Inflate File Sizes (Version 3.9)\r\nArchived: 2026-04-05 17:07:28 UTC\r\n Description\r\nAn adversary modifies file contents by adding data to files for several reasons. Many different attacks could\r\n“follow” this pattern resulting in numerous outcomes. Adding data to a file could also result in a Denial of Service\r\ncondition for devices with limited storage capacity.\r\n Likelihood Of Attack\r\n Typical Severity\r\n Relationships\r\nThis table shows the other attack patterns and high level categories that are related to this attack pattern. These\r\nrelationships are defined as ChildOf and ParentOf, and give insight to similar items that may exist at higher and\r\nlower levels of abstraction. In addition, relationships such as CanFollow, PeerOf, and CanAlsoBe are defined to\r\nshow similar attack patterns that the user may want to explore.\r\nThis table shows the views that this attack pattern belongs to and top level categories within that view.\r\n Consequences\r\nThis table specifies different individual consequences associated with the attack pattern. The Scope identifies\r\nthe security property that is violated, while the Impact describes the negative technical impact that arises if an\r\nadversary succeeds in their attack. The Likelihood provides information about how likely the specific\r\nconsequence is expected to be seen relative to the other consequences in the list. For example, there may be high\r\nlikelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to\r\nachieve a different impact.\r\nScope Impact Likelihood\r\nAvailability Resource Consumption\r\nIntegrity Modify Data\r\n Example Instances\r\nAn adversary could potentially increase file sizes on devices containing limited storage resources, such as SCADA\r\nor IOT devices, resulting in denial of service conditions.\r\nhttps://capec.mitre.org/data/definitions/572.html\r\nPage 1 of 3\n\nTaxonomy Mappings\r\nCAPEC mappings to ATT\u0026CK techniques leverage an inheritance model to streamline and minimize direct\r\nCAPEC/ATT\u0026CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has\r\nrelevant ATT\u0026CK mappings. Note that the ATT\u0026CK Enterprise Framework does not use an inheritance model as\r\npart of the mapping to CAPEC.\r\nRelevant to the ATT\u0026CK taxonomy mapping (also see parent)\r\nEntry ID Entry Name\r\n1027.001 Obfuscated Files or Information:Binary Padding\r\n Content History\r\nSubmissions\r\nSubmission\r\nDate\r\nSubmitter Organization\r\n2015-11-09\r\n(Version 2.7)\r\nCAPEC Content Team The MITRE Corporation\r\nModifications\r\nModification\r\nDate\r\nModifier Organization\r\n2019-04-04\r\n(Version 3.1)\r\nCAPEC Content Team The MITRE Corporation\r\nUpdated Related_Attack_Patterns\r\n2019-09-30\r\n(Version 3.2)\r\nCAPEC Content Team The MITRE Corporation\r\nUpdated @Abstraction, Related_Attack_Patterns\r\n2020-07-30\r\n(Version 3.3)\r\nCAPEC Content Team The MITRE Corporation\r\nUpdated Consequences, Description, Example_Instances, Likelihood_Of_Attack,\r\nTaxonomy_Mappings, Typical_Severity\r\n2021-06-24\r\n(Version 3.5)\r\nCAPEC Content Team The MITRE Corporation\r\nUpdated Related_Attack_Patterns\r\nhttps://capec.mitre.org/data/definitions/572.html\r\nPage 2 of 3\n\nMore information is available — Please select a different filter.\r\nSource: https://capec.mitre.org/data/definitions/572.html\r\nhttps://capec.mitre.org/data/definitions/572.html\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://capec.mitre.org/data/definitions/572.html"
	],
	"report_names": [
		"572.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434535,
	"ts_updated_at": 1775791318,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fb0786cf6a18ffadeb134c41da3a1c6028617378.pdf",
		"text": "https://archive.orkl.eu/fb0786cf6a18ffadeb134c41da3a1c6028617378.txt",
		"img": "https://archive.orkl.eu/fb0786cf6a18ffadeb134c41da3a1c6028617378.jpg"
	}
}