Common Information
Type Value
Value
Masquerading - T1655
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655)
Details Published Attributes CTI Title
Details Website 2024-11-08 0 New Malware "ToxicPanda" Targets Android Devices to Steal Banking Information - Cybersecurity Insiders
Details Website 2024-11-08 4 The Good, the Bad and the Ugly in Cybersecurity - Week 45
Details Website 2024-11-08 35 Life on a crooked RedLine: Analyzing the infamous infostealer’s backend
Details Website 2024-11-07 63 Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-07 4 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims
Details Website 2024-11-07 17 Unwrapping the emerging Interlock ransomware attack
Details Website 2024-11-07 86 BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence
Details Website 2024-11-07 17 Unwrapping the emerging Interlock ransomware attack
Details Website 2024-11-07 2 INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime - CyberSRC
Details Website 2024-11-07 66 European diplomats targeted by APT29 (Cozy Bear) with WINELOADER
Details Website 2024-11-07 3 Featured Articles | CrowdStrike
Details Website 2024-11-07 12 Category
Details Website 2024-11-07 4 CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
Details Website 2024-11-07 33 Malicious Inauthentic Falcon Crash Reporter Installer Delivers Malware Named Ciro
Details Website 2024-11-07 25 OneNote to Rule them All: eCrime Adversaries Adopt OneNote for Distribution
Details Website 2024-11-07 18 SUNSPOT Malware: A Technical Analysis | CrowdStrike
Details Website 2024-11-06 160 CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Details Website 2024-11-06 160 CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits - Check Point Research
Details Website 2024-11-06 1 HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
Details Website 2024-11-06 26 Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
Details Website 2024-11-06 44 GodFather Malware Targets 500 Banking & Crypto Apps Worldwide
Details Website 2024-11-05 20 ClickFix tactic: Revenge of detection
Details Website 2024-11-05 7 Inside Iran's Cyber Playbook: AI, Fake Hosting, and Psychological Warfare - CyberSRC
Details Website 2024-11-04 2 Russian disinformation campaign active ahead of 2024 US election
Details Website 2024-11-03 54 Coinminer - Malware Analysis