|Phase(s):||Resource Development||Defence Bypass|
|Tactic(s):||Credential Acquisition||Human Emulation|
The adversary seeks to establish their credibility by building a false reputation. Some sites may limit certain interactions or activities to those accounts that have performed certain actions or been active on the site for a certain length of time. Other defensive measures include a broad assessment of Internet activity for human verification, but adversaries may have automated tools mimic human Internet activity, building up a fake profile with sufficient credibility to interact with the target site as desired.