Socio-Technical Kill Plane
Interactive mapping of human psychology and cyber attack vectors
Social Media Ransomware Steps
- 1.Identify high-value social media influencers with high number of followers
- 2.Assess account security
- 3.Craft spear-phishing message (e.g., fake brand deal or Instagram support)
- 4.Malicious link via DM/email
- 5.Vulnerability to gain account access (e.g. session hijack)
- 6.Install persistence (change recovery email/phone, enable 2FA for attacker, change password)
- 7.Begin deleting followers or account content as proof
- 8.Threaten to delete all followers/account unless paid
CI's Human Layer Kill Chain
Lockheed Martin's Cyber Kill Chain