Compromise Accounts (T1586)
Why create a fake account when you can steal a real one? Real accounts have reputation and history.
1. Social Media Accounts
- Use Case: Phishing via DM (LinkedIn/Twitter). People trust DMs more than email.
- Method: Credential stuffing or buying access.
2. Email Accounts
- Business Email Compromise (BEC): Taking over a vendor's email to send fake invoices/malware to the target.
- Trust: Emails coming from
vendor.compass DMARC/SPF checks.
3. Cloud Accounts
AWS / Azure / GCP.
- Resource Hijacking: Using compromised AWS keys to spin up GPU instances for cracking hashes.
- Infrastructure: Hosting your C2 redirectors on a compromised tenant (free hosting + high reputation).