Social Media

Established, compromised, or otherwise acquired by adversaries to conduct reconnaissance, influence operations, social engineering, or other cyber threats.

Data Collection Measures:

  • API Monitoring
    • Social media APIs (e.g., Twitter API, Facebook Graph API) can extract behavioral patterns of accounts.
  • Web Scraping
    • Extracts public profile data, friend lists, or interactions to identify impersonation attempts.
  • Threat Intelligence Feeds
    • External feeds track malicious personas linked to disinformation campaigns or phishing.
  • OSINT Tools
    • Maltego, SpiderFoot, and OpenCTI can map social media persona relationships.
  • Endpoint Detection
    • EDR logs user behavior and alerts on suspicious social media interactions.
  • SIEM Logging
    • Detects access to known phishing pages or social media abuse via proxy logs.
  • Dark Web Monitoring
    • Identifies compromised social media credentials being sold.
ID: DC0052
Domains: Enterprise
Version: 2.0
Created: 20 October 2021
Last Modified: 21 October 2025

Log Sources

Name Channel
Persona None

Detection Strategy