Common Information
Type | Value |
---|---|
Value |
Masquerading - T1655 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-16 | 0 | McAfee+ Advanced 2025 Review: Your Identity’s Best Friend | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-15 | 4 | New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime | ||
Details | Website | 2024-11-14 | 72 | Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 35 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-14 | 1 | Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog | ||
Details | Website | 2024-11-14 | 3 | Germany's Cyber Threat Landscape Grows Resilient Under Fire | ||
Details | Website | 2024-11-14 | 34 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-11-13 | 0 | Learn the Definition of Penetration Testing and Also Discover Stages, Techniques, Types, Benefits | ||
Details | Website | 2024-11-13 | 0 | Rhadamanthys Threat Actors Using Fake Copyright Infringement Emails | ||
Details | Website | 2024-11-13 | 55 | HawkEye | PredatorPain | ||
Details | Website | 2024-11-12 | 1 | Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant - SOC Prime | ||
Details | Website | 2024-11-12 | 0 | Criminals Exploiting FBI Emergency Data Requests | ||
Details | Website | 2024-11-12 | 35 | Lock5 (Medusa Ransomware) | ||
Details | Website | 2024-11-12 | 1 | New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 3 | Cyber Briefing: 2024.11.11 | ||
Details | Website | 2024-11-11 | 6 | Threat Hunting Case Study: Uncovering Turla | ||
Details | Website | 2024-11-08 | 5 | Cybersecurity News Review — Week 45 | ||
Details | Website | 2024-11-08 | 4 | Weekly Cybersecurity News | ||
Details | Website | 2024-11-08 | 8 | SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC |