T1585.001 - Social Media Accounts
Sub-technique
Tattiche:
Resource Development
Resource Development
Piattaforme:
PRE
PRE
Rilevamento:
Not specified
Not specified
Description:
Adversaries may create and cultivate social media accounts that can be used during targeting. Adversaries can create social media accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage)
For operations incorporating social engineering, the utilization of a persona on social media may be important. These personas may be fictitious or impersonate real people. The persona may exist on a single social media site or across multiple sites (ex: Facebook, LinkedIn, Twitter, etc.). Establishing a persona on social media may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos.
Once a persona has been developed an adversary can use it to create connections to targets of interest. These connections may be direct or may include trying to connect through others.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) These accounts may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)).
For operations incorporating social engineering, the utilization of a persona on social media may be important. These personas may be fictitious or impersonate real people. The persona may exist on a single social media site or across multiple sites (ex: Facebook, LinkedIn, Twitter, etc.). Establishing a persona on social media may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos.
Once a persona has been developed an adversary can use it to create connections to targets of interest. These connections may be direct or may include trying to connect through others.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) These accounts may be leveraged during other phases of the adversary lifecycle, such as during Initial Access (ex: [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003)).
Usato da Attori (17)
Cleaver
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
APT32
Nation-state
Nation-state
Kimsuky
Nation-state
Nation-state
Fox Kitten
Unknown
Unknown
EXOTIC LILY
Unknown
Unknown
Scattered Spider
Unknown
Unknown
Medusa Group
Unknown
Unknown
Sandworm Team
Unknown
Unknown
HEXANE
Unknown
Unknown
Magic Hound
Unknown
Unknown
Leviathan
Unknown
Unknown
CURIUM
Unknown
Unknown
Contagious Interview
Unknown
Unknown
Moonstone Sleet
Unknown
Unknown
Star Blizzard
Unknown
Unknown
Water Galura
Unknown
Unknown
Metadata
| MITRE ID: | T1585.001 |
| STIX ID: | attack-pattern--b1ccd744-3f78-... |
| Piattaforme: | PRE |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |