Fake Credibility Generation
ID: | TEQ-007 | |
Phase(s): | Resource Development | Defence Bypass |
Tactic(s): | Credential Acquisition | Human Emulation |
The adversary seeks to establish their credibility by building a false reputation. Some sites may limit certain interactions or activities to those accounts that have performed certain actions or been active on the site for a certain length of time. Other defensive measures include a broad assessment of Internet activity for human verification, but adversaries may have automated tools mimic human Internet activity, building up a fake profile with sufficient credibility to interact with the target site as desired.