Common Information
Type | Value |
---|---|
Value |
Social Media - T1593.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search social media for information about victims that can be used during targeting. Social media sites may contain various information about a victim organization, such as business announcements as well as information about the roles, locations, and interests of staff. Adversaries may search in different social media sites depending on what information they seek to gather. Threat actors may passively harvest data from these sites, as well as use information gathered to create fake profiles/groups to elicit victim’s into revealing specific information (i.e. [Spearphishing Service](https://attack.mitre.org/techniques/T1598/001)).(Citation: Cyware Social Media) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-06 | 0 | Can TSA search your phone? Know your digital rights at the airport | ||
Details | Website | 2024-11-17 | 0 | Clicked on a Suspicious Link? Here’s What You Must Do Immediately! | ||
Details | Website | 2024-11-17 | 3 | “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”… | ||
Details | Website | 2024-11-17 | 0 | Unlocking the Truth: A Deep Dive into Mobile Forensics | ||
Details | Website | 2024-11-17 | 0 | Alexander McCartney: Predator in ‘UK’s largest catfishing case’ drove 12-year-old girl to suicide | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 18 | How to Harden Apache with HTTPS Always, Hotlink Blocking, and Rate Limiting DDOS Blocking in Rocky… | ||
Details | Website | 2024-11-17 | 1 | Compare High-speed VPN Services | ||
Details | Website | 2024-11-17 | 1 | Affordable VPN Low Prices | ||
Details | Website | 2024-11-17 | 4 | TryHackMe — Search Skills | Cyber Security 101 | ||
Details | Website | 2024-11-17 | 8 | GitHub projects targeted with malicious commits to frame researcher | ||
Details | Website | 2024-11-17 | 0 | From Forest Trails to Digital Investigations: My Journey with TraceLabs | ||
Details | Website | 2024-11-17 | 0 | The Impact of Technology on Modern Society | ||
Details | Website | 2024-11-17 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-17 | 1 | Best Price On Top-rated VPN | ||
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-17 | 7 | 1337UP CTF 2024 Writeups (partial) | ||
Details | Website | 2024-11-16 | 0 | McAfee+ Advanced 2025 Review: Your Identity’s Best Friend | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-16 | 2 | Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge | ||
Details | Website | 2024-11-16 | 1 | Is Vpn Free On Pc? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-16 | 18 | Look This ! | ||
Details | Website | 2024-11-16 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-16 | 0 | The Importance Of Data Privacy In The Digital Age | ||
Details | Website | 2024-11-16 | 0 | Barbados Debates Cybercrime Bill - ADF International | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Security Measures review |