A threat actor can hijack someone’s credibility by accessing their social media accounts (for example by using stolen passwords), and posting as them.
Category Archives: Tactic
Tactics & Techniques: “Propaganda of the digital age: How memes are weaponized to spread disinformation”
“In the document he posted online, [the Buffalo gunman] specifically credited [American neo-Nazi and white supremacist website] The Daily Stormer and its memes for having changed his views and political positions.”
Tactics & Techniques: “Fake energy-saving poster urges Swiss to inform on neighbours”
Tactics & Techniques identified in the article “Fake energy-saving poster urges Swiss to inform on neighbours”
Tactics & Techniques: “AI’s coming home: How Artificial Intelligence Can Help Tackle Racist Emoji in Football”
Tactics & Techniques identified in the article “AI’s coming home: How Artificial Intelligence Can Help Tackle Racist Emoji in Football”
Tactics & Techniques: “Anti-vax groups use carrot emojis to hide Facebook posts”
Tactics & Techniques identified in the article “Anti-vax groups use carrot emojis to hide Facebook posts”
Tactics and Techniques: “Anti-trans stalkers at Kiwi Farms are chasing one victim around the world. Their list of targets is growing”
Tactics & Techniques identified in the article “Anti-trans stalkers at Kiwi Farms are chasing one victim around the world. Their list of targets is growing”
Using ‘Paper Terrorism’ to coerce targets and waste their resources
Paper Terrorism is a harassment tactic in which people coordinate in order to hit a target with lots of illegitimate lawsuits at the same time, threatening to use them to take away targets’ money or freedom unless they acquiesce to a set of demands.
Technique Spotlight: Impersonating an existing news organisation
Threat actors can exploit peoples’ existing trust for a news organisation by pretending to be them when disseminating falsehoods. This also wastes resource of the targeted organisation.
Impersonating a Fact Checker
Impersonating a Fact Checker to spread fake fact checks makes people think it’s hard to get accurate information about the topic. It also exploits peoples’ existing faith in Fact Checkers to increase the probability that people believe posted content.
Influencers being paid to amplify inauthentic messages to their audience
Building an audience that will reliably read the content you post is difficult, so threat actors can pay others who have already built an audience to share what they’ve produced. This has the added benefit of appearing more authentic.