Common Information
Type | Value |
---|---|
Value |
Social Media Accounts - T1585.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create and cultivate social media accounts that can be used during targeting. Adversaries can create social media accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) For operations incorporating social engineering, the utilization of a persona on social media may be important. These personas may be fictitious or impersonate real people. The persona may exist on a single social media site or across multiple sites (ex: Facebook, LinkedIn, Twitter, etc.). Establishing a persona on social media may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos. Once a persona has been developed an adversary can use it to create connections to targets of interest. These connections may be direct or may include trying to connect through others.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) These accounts may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | Unlocking the Truth: A Deep Dive into Mobile Forensics | ||
Details | Website | 2024-11-17 | 3 | LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected | ||
Details | Website | 2024-11-16 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-16 | 40 | ‘Tis the season to be wary’: Huge online retail scam uncovered in the lead-up to Christmas. — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-15 | 0 | Cybercrime as an industry: examining the organisational structure of Chinese cybercrime | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-14 | 0 | The Mystery Photo Hunt! 🔎 Challenge | ||
Details | Website | 2024-11-14 | 0 | Why Bots Fail Google’s “I’m Not a Robot” Test — But You Pass | ||
Details | Website | 2024-11-14 | 35 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-14 | 2 | Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy | ||
Details | Website | 2024-11-14 | 34 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-14 | 0 | The Modern-Day Gold Rush: Why Cybersecurity is the Key to Protecting Our Digital Wealth | ||
Details | Website | 2024-11-14 | 31 | Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers | ||
Details | Website | 2024-11-13 | 0 | What Data Could an MSSP Monitor on the Darknet on Behalf of their Client and Why | ||
Details | Website | 2024-11-13 | 5 | LetsDefend SOC Walkthrough | SOC135 — Multiple FTP Connection Attempt | ||
Details | Website | 2024-11-12 | 0 | How I Hijacked an Abandoned Twitter Account and Why Broken Link Hijacking Matters | ||
Details | Website | 2024-11-12 | 1 | DNA testing company vanishes along with its customers' genetic data | Malwarebytes | ||
Details | Website | 2024-11-12 | 11 | Infostealer Malware: An Introduction | ||
Details | Website | 2024-11-11 | 0 | REVIEW — Is the beginner path in TRY HACK ME worth the price & time .? | ||
Details | Website | 2024-11-11 | 1 | Cheap High-speed VPN Offers | ||
Details | Website | 2024-11-10 | 0 | The Growing Threat of Cyber Imitation: How to Protect Yourself in an Increasingly Fake Digital… | ||
Details | Website | 2024-11-10 | 4 | Securing your Communications | ||
Details | Website | 2024-11-10 | 1 | Find Secure VPN Deals | ||
Details | Website | 2024-11-10 | 9 | Understanding Network Security Basics: Firewalls, VPNs, and Proxies | ||
Details | Website | 2024-11-10 | 0 | How Do I Check My Internet Security? Essential Tips Revealed |