Common Information
Type Value
Value
Masquerading - T1655
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655)
Details Published Attributes CTI Title
Details Website 2024-10-03 38 Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Details Website 2024-10-03 16 SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Details Website 2024-10-03 11 Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Details Website 2024-10-02 3 Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity
Details Website 2024-10-02 0 5,000 Fake Microsoft Emails that Your Employees Could Fall For - Check Point Blog
Details Website 2024-10-02 0 The Human Factor: Cisco’s 2022 Breach and the Art of Deception
Details Website 2024-10-02 57 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
Details Website 2024-10-01 28 SOC Simulator | MyDFIR: 30-Day SOC Analyst Challenge
Details Website 2024-10-01 11 VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection
Details Website 2024-10-01 27 Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble
Details Website 2024-09-30 5 Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva
Details Website 2024-09-30 6 Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters
Details Website 2024-09-30 0 Social Engineering: The Fascination About This Method of Exploitation.
Details Website 2024-09-30 32 Hadooken and K4Spreader: The 8220 Gang's Latest Arsenal
Details Website 2024-09-30 174 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
Details Website 2024-09-30 33 MDR in Action: Preventing The More_eggs Backdoor From Hatching
Details Website 2024-09-29 0 Security’s Weakest Link
Details Website 2024-09-27 0 The Dumbest Thing in Security This Week: The Cute Things (Alleged) Cybercriminals Do
Details Website 2024-09-27 1 New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Details Website 2024-09-27 0 Top 6 Cloud Security Threats to Watch Out For
Details Website 2024-09-27 5 Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics
Details Website 2024-09-27 2 Blog 149 # Navigating the Cyber Frontier: Past, Present & Future Threats
Details Website 2024-09-27 2 The Rise of Octo2: Understanding the Latest Mobile Banking Threat
Details Website 2024-09-27 1 Cyber Attack news headlines trending on Google - Cybersecurity Insiders
Details Website 2024-09-27 123 Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs