Fake Credibility Generation

ID: TEQ-007
Phase(s): Resource Development Defence Bypass
Tactic(s): Credential Acquisition Human Emulation

The adversary seeks to establish their credibility by building a false reputation. Some sites may limit certain interactions or activities to those accounts that have performed certain actions or been active on the site for a certain length of time. Other defensive measures include a broad assessment of Internet activity for human verification, but adversaries may have automated tools mimic human Internet activity, building up a fake profile with sufficient credibility to interact with the target site as desired.