Common Information
Type | Value |
---|---|
Value |
Hooking - T1617 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may utilize hooking to hide the presence of artifacts associated with their behaviors to evade detection. Hooking can be used to modify return values or data structures of system APIs and function calls. This process typically involves using 3rd party root frameworks, such as Xposed or Magisk, with either a system exploit or pre-existing root access. By including custom modules for root frameworks, adversaries can hook system APIs and alter the return value and/or system data structures to alter functionality/visibility of various aspects of the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-05 | 18 | Lumma Malware | ||
Details | Website | 2024-09-05 | 3 | Attack Surface [Guest Diary] - SANS Internet Storm Center | ||
Details | Website | 2024-09-05 | 3 | Pwn2Own Automotive 2024: Hacking the Autel MaxiCharger | ||
Details | Website | 2024-09-05 | 7 | Analysis of Evolving Evasion Tradecraft in Contemporary Malware and Command-and-Control Frameworks | ||
Details | Website | 2024-09-04 | 2 | Deploying Rust in Existing Firmware Codebases | ||
Details | Website | 2024-09-04 | 2 | Deploying Rust in Existing Firmware Codebases | ||
Details | Website | 2024-08-31 | 12 | InsecureBankv2 Pentest Report | ||
Details | Website | 2024-08-29 | 7 | Live Patching DLLs with Python - SANS Internet Storm Center | ||
Details | Website | 2024-08-28 | 9 | Attacking Android Malware with Frida | ||
Details | Website | 2024-08-27 | 10 | Taking the Crossroads: The Versa Director Zero-Day Exploitation - Lumen | ||
Details | Website | 2024-08-19 | 6 | Technical Analysis: CVE-2024-38021 | ||
Details | Website | 2024-08-18 | 0 | Pet Lovers Deploys 100-site SD-WAN, Eliminates Firewalls with Cato Cloud | ||
Details | Website | 2024-08-15 | 85 | Tusk campaign uses infostealers and clippers for financial gain | ||
Details | Website | 2024-08-09 | 0 | Tech Analysis: CrowdStrike's Kernel Access and Security Architecture | ||
Details | Website | 2024-07-25 | 33 | Thread Name-Calling - using Thread Name for offense - Check Point Research | ||
Details | Website | 2024-07-18 | 26 | HotPage: Story of a signed, vulnerable, ad-injecting driver | ||
Details | Website | 2024-07-01 | 62 | Kimsuky deploys TRANSLATEXT to target South Korean academia | ||
Details | Website | 2024-06-20 | 67 | Android app抓包场景详解 | ||
Details | Website | 2024-06-18 | 1 | New Diamorphine rootkit variant seen undetected in the wild - Avast Threat Labs | ||
Details | Website | 2024-06-18 | 30 | Cloaked and Covert: Uncovering UNC3886 Espionage Operations | Google Cloud Blog | ||
Details | Website | 2024-06-03 | 16 | Unveiling Sharp Panda’s New Loader – Securite360 | ||
Details | Website | 2024-05-30 | 11 | Protecting your devices from information theft — Elastic Security Labs | ||
Details | Website | 2024-05-30 | 11 | 情報窃取から端末を守る — Elastic Security Labs | ||
Details | Website | 2024-05-09 | 10 | Emulation with Qiling - LRQA Nettitude Labs | ||
Details | Website | 2024-05-06 | 27 | HijackLoader Updates |