Common Information
Type | Value |
---|---|
Value |
Masquerading - T1655 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1655) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-03 | 38 | Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat | ||
Details | Website | 2024-10-03 | 16 | SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More | ||
Details | Website | 2024-10-03 | 11 | Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems | ||
Details | Website | 2024-10-02 | 3 | Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity | ||
Details | Website | 2024-10-02 | 0 | 5,000 Fake Microsoft Emails that Your Employees Could Fall For - Check Point Blog | ||
Details | Website | 2024-10-02 | 0 | The Human Factor: Cisco’s 2022 Breach and the Art of Deception | ||
Details | Website | 2024-10-02 | 57 | Separating the bee from the panda: CeranaKeeper making a beeline for Thailand | ||
Details | Website | 2024-10-01 | 28 | SOC Simulator | MyDFIR: 30-Day SOC Analyst Challenge | ||
Details | Website | 2024-10-01 | 11 | VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection | ||
Details | Website | 2024-10-01 | 27 | Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble | ||
Details | Website | 2024-09-30 | 5 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva | ||
Details | Website | 2024-09-30 | 6 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | ||
Details | Website | 2024-09-30 | 0 | Social Engineering: The Fascination About This Method of Exploitation. | ||
Details | Website | 2024-09-30 | 32 | Hadooken and K4Spreader: The 8220 Gang's Latest Arsenal | ||
Details | Website | 2024-09-30 | 174 | Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | ||
Details | Website | 2024-09-30 | 33 | MDR in Action: Preventing The More_eggs Backdoor From Hatching | ||
Details | Website | 2024-09-29 | 0 | Security’s Weakest Link | ||
Details | Website | 2024-09-27 | 0 | The Dumbest Thing in Security This Week: The Cute Things (Alleged) Cybercriminals Do | ||
Details | Website | 2024-09-27 | 1 | New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users | ||
Details | Website | 2024-09-27 | 0 | Top 6 Cloud Security Threats to Watch Out For | ||
Details | Website | 2024-09-27 | 5 | Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics | ||
Details | Website | 2024-09-27 | 2 | Blog 149 # Navigating the Cyber Frontier: Past, Present & Future Threats | ||
Details | Website | 2024-09-27 | 2 | The Rise of Octo2: Understanding the Latest Mobile Banking Threat | ||
Details | Website | 2024-09-27 | 1 | Cyber Attack news headlines trending on Google - Cybersecurity Insiders | ||
Details | Website | 2024-09-27 | 123 | Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs |