Common Information
Type Value
Value
Hide Artifacts - T1628
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection.
Details Published Attributes CTI Title
Details Website 2024-06-24 53 Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame
Details Website 2024-05-30 18 Decoding Water Sigbin's Latest Obfuscation Tricks
Details Website 2024-02-26 32 Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-19 117 LitterDrifter: a new USB worm used by the Gamaredon group
Details Website 2023-11-15 5 Velociraptor 0.7.1 Release :: Velociraptor - Digging deeper!
Details Website 2023-11-14 12 Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine - SOC Prime
Details Website 2023-11-01 44 Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs
Details Website 2023-10-25 27 The Duck is Hiring in Italy: DUCKTAIL Spread via Compromised LinkedIn Profiles
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-16 12 UAC-0165 Activity Detection: Destructive Cyber Attacks Targeting Ukrainian Telecom Providers  - SOC Prime
Details Website 2023-10-11 13 Unraveling the Illusion of Trust: The Innovative Attack Methodology Leveraging the "search-ms" URI Protocol Handler
Details Website 2023-10-06 22 Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform
Details Website 2023-10-04 88 A peek into APT36’s updated arsenal
Details Website 2023-09-18 48 WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2023-08-17 84 Scattered Spider: The Modus Operandi
Details Website 2023-08-07 11 New MerlinAgent Open-Source Tool Used by UAC-0154 Group to Target Ukrainian State Agencies - SOC Prime
Details Website 2023-07-27 50 Dark Web Profile: 8Base Ransomware
Details Website 2023-07-25 6 APT Profile: Kimsuky - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-07-25 15 Threat Actor Targeting Developers via Trojanized MS Visual Studio
Details Website 2023-07-12 13 Unraveling the Illusion of Trust: The Innovative Attack Methodology Leveraging the "search-ms" URI Protocol Handler
Details Website 2023-06-29 98 PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater | Deep Instinct
Details Website 2023-06-27 42 Behind the Scenes of a Phishing Attack: How DMARC Protects Against Phishing and Spoofing Threats
Details Website 2023-06-21 22 Initial research exposing JOKERSPY — Elastic Security Labs