Skip to content

Hide Navigation Hide TOC

Social Media (8fb2f315-1aca-4cef-ae0d-8105e1f95985)

Established, compromised, or otherwise acquired by adversaries to conduct reconnaissance, influence operations, social engineering, or other cyber threats.

Data Collection Measures:

  • API Monitoring
    • Social media APIs (e.g., Twitter API, Facebook Graph API) can extract behavioral patterns of accounts.
  • Web Scraping
    • Extracts public profile data, friend lists, or interactions to identify impersonation attempts.
  • Threat Intelligence Feeds
    • External feeds track malicious personas linked to disinformation campaigns or phishing.
  • OSINT Tools
    • Maltego, SpiderFoot, and OpenCTI can map social media persona relationships.
  • Endpoint Detection
    • EDR logs user behavior and alerts on suspicious social media interactions.
  • SIEM Logging
    • Detects access to known phishing pages or social media abuse via proxy logs.
  • Dark Web Monitoring
    • Identifies compromised social media credentials being sold.
Cluster A Galaxy A Cluster B Galaxy B Level
Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) Attack Pattern Social Media (8fb2f315-1aca-4cef-ae0d-8105e1f95985) mitre-data-component 1
Compromise Accounts - T1586 (81033c3b-16a4-46e4-8fed-9b030dd03c4a) Attack Pattern Social Media (8fb2f315-1aca-4cef-ae0d-8105e1f95985) mitre-data-component 1
Social Media Accounts - T1585.001 (b1ccd744-3f78-4a0e-9bb2-2002057f7928) Attack Pattern Social Media (8fb2f315-1aca-4cef-ae0d-8105e1f95985) mitre-data-component 1
Social Media (8fb2f315-1aca-4cef-ae0d-8105e1f95985) mitre-data-component Social Media Accounts - T1586.001 (274770e0-2612-4ccf-a678-ef8e7bad365d) Attack Pattern 1
Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) Attack Pattern Social Media Accounts - T1585.001 (b1ccd744-3f78-4a0e-9bb2-2002057f7928) Attack Pattern 2
Compromise Accounts - T1586 (81033c3b-16a4-46e4-8fed-9b030dd03c4a) Attack Pattern Social Media Accounts - T1586.001 (274770e0-2612-4ccf-a678-ef8e7bad365d) Attack Pattern 2