Common Information
Type Value
Value
Social Media - T1593.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may search social media for information about victims that can be used during targeting. Social media sites may contain various information about a victim organization, such as business announcements as well as information about the roles, locations, and interests of staff. Adversaries may search in different social media sites depending on what information they seek to gather. Threat actors may passively harvest data from these sites, as well as use information gathered to create fake profiles/groups to elicit victim’s into revealing specific information (i.e. [Spearphishing Service](https://attack.mitre.org/techniques/T1598/001)).(Citation: Cyware Social Media) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)).
Details Published Attributes CTI Title
Details Website 2024-12-06 0 Can TSA search your phone? Know your digital rights at the airport
Details Website 2024-11-17 0 Clicked on a Suspicious Link? Here’s What You Must Do Immediately!
Details Website 2024-11-17 3 “Embarking on API Security Testing: A Beginner’s Guide to Understanding APIs and Utilizing Postman”…
Details Website 2024-11-17 0 Unlocking the Truth: A Deep Dive into Mobile Forensics
Details Website 2024-11-17 0 Alexander McCartney: Predator in ‘UK’s largest catfishing case’ drove 12-year-old girl to suicide | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting
Details Website 2024-11-17 18 How to Harden Apache with HTTPS Always, Hotlink Blocking, and Rate Limiting DDOS Blocking in Rocky…
Details Website 2024-11-17 1 Compare High-speed VPN Services
Details Website 2024-11-17 1 Affordable VPN Low Prices
Details Website 2024-11-17 4 TryHackMe — Search Skills | Cyber Security 101
Details Website 2024-11-17 8 GitHub projects targeted with malicious commits to frame researcher
Details Website 2024-11-17 0 From Forest Trails to Digital Investigations: My Journey with TraceLabs
Details Website 2024-11-17 0 The Impact of Technology on Modern Society
Details Website 2024-11-17 1 Solid Security Pro Review
Details Website 2024-11-17 1 Best Price On Top-rated VPN
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-17 7 1337UP CTF 2024 Writeups (partial)
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-16 2 Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge
Details Website 2024-11-16 1 Is Vpn Free On Pc? — Comprehensive Guide And FAQs
Details Website 2024-11-16 18 Look This !
Details Website 2024-11-16 0 How Hackers Turn Your Information into a Weapon
Details Website 2024-11-16 0 The Importance Of Data Privacy In The Digital Age
Details Website 2024-11-16 0 Barbados Debates Cybercrime Bill - ADF International | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-16 1 Solid Security Pro Security Measures review