Social media as a weapon

open

The research focus was given on the use of Social media in the offensive process. Indeed, from the reconnaissance stage to the benefits of the attacks, threat actors actively use different social platforms for social and technical engineering. This duality proves the socio-technical character of cyber attacks.

  1. Introduction
  2. Reconnaissance: selection and psychological leverages intel
  3. Intrusion: delivery and installation
  4. Pursue and refine the attack
  5. Selling and sharing: post-attack benefits