A threat actor can hijack someone’s credibility by accessing their social media accounts (for example by using stolen passwords), and posting as them.
“In the document he posted online, [the Buffalo gunman] specifically credited [American neo-Nazi and white supremacist website] The Daily Stormer and its memes for having changed his views and political positions.”
Tactics & Techniques identified in the article “Fake energy-saving poster urges Swiss to inform on neighbours”
Tactics & Techniques identified in the article “AI’s coming home: How Artificial Intelligence Can Help Tackle Racist Emoji in Football”
Tactics & Techniques identified in the article “Anti-vax groups use carrot emojis to hide Facebook posts”
Tactics & Techniques identified in the article “Anti-trans stalkers at Kiwi Farms are chasing one victim around the world. Their list of targets is growing”
Paper Terrorism is a harassment tactic in which people coordinate in order to hit a target with lots of illegitimate lawsuits at the same time, threatening to use them to take away targets’ money or freedom unless they acquiesce to a set of demands.
Threat actors can exploit peoples’ existing trust for a news organisation by pretending to be them when disseminating falsehoods. This also wastes resource of the targeted organisation.
Impersonating a Fact Checker to spread fake fact checks makes people think it’s hard to get accurate information about the topic. It also exploits peoples’ existing faith in Fact Checkers to increase the probability that people believe posted content.
Building an audience that will reliably read the content you post is difficult, so threat actors can pay others who have already built an audience to share what they’ve produced. This has the added benefit of appearing more authentic.