Common Information
Type Value
Value
Hide Artifacts - T1628
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection.
Details Published Attributes CTI Title
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-01 39 Dark Web Profile: Tropic Trooper (APT23) - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-30 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2024-10-29 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium
Details Website 2024-10-23 22 DarkComet RAT: Technical Analysis of Attack Chain
Details Website 2024-10-23 22 DarkComet RAT: Technical Analysis of Attack Chain - ANY.RUN's Cybersecurity Blog
Details Website 2024-10-18 44 Weekly Intelligence Report - 18 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-16 13 UAC-0050 Attack Detection: russia-Backed APT Performs Cyber Espionage, Financial Crimes, and Disinformation Operations Against Ukraine - SOC Prime
Details Website 2024-10-13 30 HackTheBox — CrownJewel-1 Sherlock Walkthrough
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Details Website 2024-10-10 14 Building a Automated Linux Sandbox for Malware Analysis
Details Website 2024-10-07 141 Mind the (air) gap: GoldenJackal gooses government guardrails
Details Website 2024-10-06 18 YUNIT STEALER - CYFIRMA
Details Website 2024-10-04 100 Агент SIEM используется в атаках SilentCryptoMiner
Details Website 2024-10-04 100 SIEM agent being used in SilentCryptoMiner attacks
Details Website 2024-10-03 38 perfctl: A Stealthy Malware Targeting Millions of Linux Servers
Details Website 2024-10-02 35 Threat Brief: Understanding Akira Ransomware | Qualys Security Blog
Details Website 2024-09-27 123 Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs
Details Website 2024-09-27 58 OSINT Investigation: Hunting Malicious Infrastructure Linked to Transparent Tribe - CYFIRMA
Details Website 2024-09-05 73 BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
Details Website 2024-09-04 71 AZORult Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-08-21 13 UAC-0020 (Vermin) Activity Detection: A New Phishing Attack Abusing the Topic of Prisoners of War at the Kursk Front and Using FIRMACHAGENT Malware - SOC Prime
Details Website 2024-07-16 89 MirrorFace Attack against Japanese Organisations - JPCERT/CC Eyes