Common Information
Type Value
Value
Masquerading
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may use masquerading to disguise a malicious application or executable as another file, to avoid operator and engineer suspicion. Possible disguises of these masquerading files can include commonly found programs, expected vendor executables and configuration files, and other commonplace application and naming conventions. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running those masquerading as legitimate functions. Applications and other files commonly found on Windows systems or in engineering workstations have been impersonated before. This can be as simple as renaming a file to effectively disguise it in the ICS environment.
Details Published Attributes CTI Title
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 4 New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 35 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 1 Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog
Details Website 2024-11-14 3 Germany's Cyber Threat Landscape Grows Resilient Under Fire
Details Website 2024-11-14 34 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-11-13 0 Learn the Definition of Penetration Testing and Also Discover Stages, Techniques, Types, Benefits
Details Website 2024-11-13 0 Rhadamanthys Threat Actors Using Fake Copyright Infringement Emails
Details Website 2024-11-13 55 HawkEye | PredatorPain
Details Website 2024-11-12 1 Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant - SOC Prime
Details Website 2024-11-12 0 Criminals Exploiting FBI Emergency Data Requests
Details Website 2024-11-12 35 Lock5 (Medusa Ransomware)
Details Website 2024-11-12 1 New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-11 3 Cyber Briefing: 2024.11.11
Details Website 2024-11-11 6 Threat Hunting Case Study: Uncovering Turla
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 4 Weekly Cybersecurity News
Details Website 2024-11-08 8 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC