Common Information
Type | Value |
---|---|
Value |
Masquerading - T1655 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-17 | 100 | Flying in the clouds: APT31 renews its attacks on Russian companies through cloud storage | ||
Details | Website | 2024-10-17 | 75 | APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere | ||
Details | Website | 2024-10-16 | 2 | Coffee Lovers Warned of New Starbucks Phishing Scam | ||
Details | Website | 2024-10-16 | 2 | Police Highlight Cyber Security Awareness Month | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-10-15 | 2 | Police issue advice on prevention of cybercrime - The Royal Gazette | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-10-14 | 14 | 22/30 MyDFIR SOC Analyst Challenge | ||
Details | Website | 2024-10-14 | 0 | You’re good enough, you’re smart enough, and doggone it, cybercriminals love you! | ||
Details | Website | 2024-10-14 | 55 | Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats | ||
Details | Website | 2024-10-14 | 0 | Cyber Security Course in Dubai: Your Gateway to a Secure Future | ||
Details | Website | 2024-10-14 | 19 | Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign Targets Brazil With Astaroth Malware | ||
Details | Website | 2024-10-12 | 1 | “Mastering the Human Mind: The Advanced Art of Social Engineering in Cybersecurity” | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium | ||
Details | Website | 2024-10-11 | 0 | Cybersecurity Consulting for SMBs: Protecting Your Business in the Digital Age | ||
Details | Website | 2024-10-11 | 71 | Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-10 | 29 | Technical Analysis of a Novel IMEEX Framework | ||
Details | Website | 2024-10-10 | 28 | Technical Analysis of a Novel IMEEX Framework | ||
Details | Website | 2024-10-10 | 2 | Cyber Briefing: 2024.10.10 | ||
Details | Website | 2024-10-10 | 33 | Malware by the (Bit)Bucket: Uncovering AsyncRAT | ||
Details | Website | 2024-10-10 | 9 | AhnLab EDR을 활용한 BPFDoor 리눅스 악성코드 탐지 - ASEC | ||
Details | Website | 2024-10-10 | 22 | Secure Your World with Phishing Resistant Passkeys | ||
Details | Website | 2024-10-10 | 182 | Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | CTF导航 | ||
Details | Website | 2024-10-09 | 9 | BPFDoor Linux Malware Detected by AhnLab EDR - ASEC | ||
Details | Website | 2024-10-09 | 36 | Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware | ||
Details | Website | 2024-10-09 | 0 | Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections - Check Point Blog |