Fake Credibility Generation
| ID: | TEQ-007 | |
| Phase(s): | Resource Development | Defence Bypass | 
| Tactic(s): | Credential Acquisition | Human Emulation | 
The adversary seeks to establish their credibility by building a false reputation. Some sites may limit certain interactions or activities to those accounts that have performed certain actions or been active on the site for a certain length of time. Other defensive measures include a broad assessment of Internet activity for human verification, but adversaries may have automated tools mimic human Internet activity, building up a fake profile with sufficient credibility to interact with the target site as desired.