Common Information
Type Value
Value
Hide Artifacts - T1628
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection.
Details Published Attributes CTI Title
Details Website 2023-06-06 18 UAC-0099 Activity Detection: Hackers Conduct Cyber-Espionage Operations Against Ukrainian State Bodies and Media Organizations - SOC Prime
Details Website 2023-05-30 112 Russia/Ukraine Update - May 2023
Details Website 2023-05-25 17 Chinese State-Sponsored Cyber Actor Detection: Joint Cybersecurity Advisory (CSA) AA23-144a Sheds Light on Stealty Activity by Volt Typhoon Targeting U.S. Critical Infrastructure - SOC Prime
Details Website 2023-05-17 25 AndoryuBot's DDOS Rampage
Details Website 2023-05-09 19 Hunting Russian Intelligence “Snake” Malware | CISA
Details Website 2023-05-07 48 Incident Response Games — #1 EMOTET | Squiblydoo
Details Website 2023-05-03 15 WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat - SOC Prime
Details Website 2023-05-01 47 SeroXen RAT for sale
Details Website 2023-04-25 48 The Claws of Evilcode Gauntlet - XWorm RAT   - Avira Blog
Details Website 2023-04-18 39 PrivateLoader. Analyzing the Malware Encryption and Decryption
Details Website 2023-04-10 86 Threat Actor Spotlight: RagnarLocker Ransomware
Details Website 2023-02-28 16 Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig
Details Website 2023-02-28 56 Anomali Cyber Watch: Newly-Discovered WinorDLL64 Backdoor Has Code Similarities with Lazarus GhostSecret, Atharvan Backdoor Can Be Restricted to Communicate on Certain Days
Details Website 2023-01-31 12 UAC-0082 (Sandworm APT Group) Targets Ukrainian National Information Agency “Ukrinform” in a Series of Cyber Attacks Leveraging Multiple Wiper Malware Strains - SOC Prime
Details Website 2023-01-10 40 Anomali Cyber Watch: Turla Re-Registered Andromeda Domains, SpyNote Is More Popular after the Source Code Publication, Typosquatted Site Used to Leak Company’s Data
Details Website 2022-12-22 65 An infostealer comes to town: Dissecting a highly evasive malware targeting Italy
Details Website 2022-11-16 132 Venus Ransomware | Zeoticus Spin-off Shows Sophistication Isn’t Necessary for Success
Details Website 2022-10-26 10 Threat Actors Target AWS EC2 Workloads to Steal Credentials
Details Website 2022-10-26 11 Threat Actors Target AWS EC2 Workloads to Steal Credentials
Details Website 2022-10-17 75 Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal?
Details Website 2022-09-27 21 Anomali Cyber Watch: Sandworm Uses HTML Smuggling and Commodity RATs, BlackCat Ransomware Adds New Features, Domain Shadowing Is Rarely Detected, and More
Details Website 2022-09-21 18 Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware
Details Website 2022-09-21 18 Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware
Details Website 2022-09-15 73 From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder
Details Website 2022-09-08 7 How Malicious Actors Abuse Native Linux Tools in Their Attacks