Common Information
Type | Value |
---|---|
Value |
Hide Artifacts - T1628 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-06-24 | 53 | Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame | ||
Details | Website | 2024-05-30 | 18 | Decoding Water Sigbin's Latest Obfuscation Tricks | ||
Details | Website | 2024-02-26 | 32 | Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-11-19 | 117 | LitterDrifter: a new USB worm used by the Gamaredon group | ||
Details | Website | 2023-11-15 | 5 | Velociraptor 0.7.1 Release :: Velociraptor - Digging deeper! | ||
Details | Website | 2023-11-14 | 12 | Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine - SOC Prime | ||
Details | Website | 2023-11-01 | 44 | Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs | ||
Details | Website | 2023-10-25 | 27 | The Duck is Hiring in Italy: DUCKTAIL Spread via Compromised LinkedIn Profiles | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-10-16 | 12 | UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers - SOC Prime | ||
Details | Website | 2023-10-11 | 13 | Unraveling the Illusion of Trust: The Innovative Attack Methodology Leveraging the "search-ms" URI Protocol Handler | ||
Details | Website | 2023-10-06 | 22 | Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform | ||
Details | Website | 2023-10-04 | 88 | A peek into APT36’s updated arsenal | ||
Details | Website | 2023-09-18 | 48 | WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-08-17 | 84 | Scattered Spider: The Modus Operandi | ||
Details | Website | 2023-08-07 | 11 | New MerlinAgent Open-Source Tool Used by UAC-0154 Group to Target Ukrainian State Agencies - SOC Prime | ||
Details | Website | 2023-07-27 | 50 | Dark Web Profile: 8Base Ransomware | ||
Details | Website | 2023-07-25 | 6 | APT Profile: Kimsuky - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2023-07-25 | 15 | Threat Actor Targeting Developers via Trojanized MS Visual Studio | ||
Details | Website | 2023-07-12 | 13 | Unraveling the Illusion of Trust: The Innovative Attack Methodology Leveraging the "search-ms" URI Protocol Handler | ||
Details | Website | 2023-06-29 | 98 | PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater | Deep Instinct | ||
Details | Website | 2023-06-27 | 42 | Behind the Scenes of a Phishing Attack: How DMARC Protects Against Phishing and Spoofing Threats | ||
Details | Website | 2023-06-21 | 22 | Initial research exposing JOKERSPY — Elastic Security Labs |