Common Information
Type | Value |
---|---|
Value |
Masquerading - T1655 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-08 | 0 | New Malware "ToxicPanda" Targets Android Devices to Steal Banking Information - Cybersecurity Insiders | ||
Details | Website | 2024-11-08 | 4 | The Good, the Bad and the Ugly in Cybersecurity - Week 45 | ||
Details | Website | 2024-11-08 | 35 | Life on a crooked RedLine: Analyzing the infamous infostealer’s backend | ||
Details | Website | 2024-11-07 | 63 | Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-07 | 4 | SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims | ||
Details | Website | 2024-11-07 | 17 | Unwrapping the emerging Interlock ransomware attack | ||
Details | Website | 2024-11-07 | 86 | BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence | ||
Details | Website | 2024-11-07 | 17 | Unwrapping the emerging Interlock ransomware attack | ||
Details | Website | 2024-11-07 | 2 | INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime - CyberSRC | ||
Details | Website | 2024-11-07 | 66 | European diplomats targeted by APT29 (Cozy Bear) with WINELOADER | ||
Details | Website | 2024-11-07 | 3 | Featured Articles | CrowdStrike | ||
Details | Website | 2024-11-07 | 12 | Category | ||
Details | Website | 2024-11-07 | 4 | CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes | ||
Details | Website | 2024-11-07 | 33 | Malicious Inauthentic Falcon Crash Reporter Installer Delivers Malware Named Ciro | ||
Details | Website | 2024-11-07 | 25 | OneNote to Rule them All: eCrime Adversaries Adopt OneNote for Distribution | ||
Details | Website | 2024-11-07 | 18 | SUNSPOT Malware: A Technical Analysis | CrowdStrike | ||
Details | Website | 2024-11-06 | 160 | CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits | ||
Details | Website | 2024-11-06 | 160 | CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits - Check Point Research | ||
Details | Website | 2024-11-06 | 1 | HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data | ||
Details | Website | 2024-11-06 | 26 | Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign | ||
Details | Website | 2024-11-06 | 44 | GodFather Malware Targets 500 Banking & Crypto Apps Worldwide | ||
Details | Website | 2024-11-05 | 20 | ClickFix tactic: Revenge of detection | ||
Details | Website | 2024-11-05 | 7 | Inside Iran's Cyber Playbook: AI, Fake Hosting, and Psychological Warfare - CyberSRC | ||
Details | Website | 2024-11-04 | 2 | Russian disinformation campaign active ahead of 2024 US election | ||
Details | Website | 2024-11-03 | 54 | Coinminer - Malware Analysis |