Common Information
Type Value
Value
Masquerading - T1655
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655)
Details Published Attributes CTI Title
Details Website 2024-10-17 100 Flying in the clouds: APT31 renews its attacks on Russian companies through cloud storage
Details Website 2024-10-17 75 APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere
Details Website 2024-10-16 2 Coffee Lovers Warned of New Starbucks Phishing Scam
Details Website 2024-10-16 2 Police Highlight Cyber Security Awareness Month | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-15 2 Police issue advice on prevention of cybercrime - The Royal Gazette | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-14 14 22/30 MyDFIR SOC Analyst Challenge
Details Website 2024-10-14 0 You’re good enough, you’re smart enough, and doggone it, cybercriminals love you!
Details Website 2024-10-14 55 Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats
Details Website 2024-10-14 0 Cyber Security Course in Dubai: Your Gateway to a Secure Future
Details Website 2024-10-14 19 Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign Targets Brazil With Astaroth Malware
Details Website 2024-10-12 1 “Mastering the Human Mind: The Advanced Art of Social Engineering in Cybersecurity”
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Details Website 2024-10-11 0 Cybersecurity Consulting for SMBs: Protecting Your Business in the Digital Age
Details Website 2024-10-11 71 Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-10 29 Technical Analysis of a Novel IMEEX Framework
Details Website 2024-10-10 28 Technical Analysis of a Novel IMEEX Framework
Details Website 2024-10-10 2 Cyber Briefing: 2024.10.10
Details Website 2024-10-10 33 Malware by the (Bit)Bucket: Uncovering AsyncRAT
Details Website 2024-10-10 9 AhnLab EDR을 활용한 BPFDoor 리눅스 악성코드 탐지 - ASEC
Details Website 2024-10-10 22 Secure Your World with Phishing Resistant Passkeys
Details Website 2024-10-10 182 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | CTF导航
Details Website 2024-10-09 9 BPFDoor Linux Malware Detected by AhnLab EDR - ASEC
Details Website 2024-10-09 36 Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
Details Website 2024-10-09 0 Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections - Check Point Blog