Common Information
Type Value
Value
Hide Artifacts - T1628
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection.
Details Published Attributes CTI Title
Details Website 2020-01-22 12 WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation | Malwarebytes Labs
Details Website 2019-08-04 34 Back to square one: The Capital One breach proved we must rethink cloud security - Darktrace Blog
Details Website 2016-09-28 11 Forensic Analysis of Anti-Forensic Activities