Common Information
Type Value
Value
Masquerading - T1655
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655)
Details Published Attributes CTI Title
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 4 New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 35 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 1 Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog
Details Website 2024-11-14 3 Germany's Cyber Threat Landscape Grows Resilient Under Fire
Details Website 2024-11-14 34 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-11-13 0 Learn the Definition of Penetration Testing and Also Discover Stages, Techniques, Types, Benefits
Details Website 2024-11-13 0 Rhadamanthys Threat Actors Using Fake Copyright Infringement Emails
Details Website 2024-11-13 55 HawkEye | PredatorPain
Details Website 2024-11-12 1 Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant - SOC Prime
Details Website 2024-11-12 0 Criminals Exploiting FBI Emergency Data Requests
Details Website 2024-11-12 35 Lock5 (Medusa Ransomware)
Details Website 2024-11-12 1 New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-11 3 Cyber Briefing: 2024.11.11
Details Website 2024-11-11 6 Threat Hunting Case Study: Uncovering Turla
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 4 Weekly Cybersecurity News
Details Website 2024-11-08 8 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC