Common Information
Type | Value |
---|---|
Value |
Masquerading |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may use masquerading to disguise a malicious application or executable as another file, to avoid operator and engineer suspicion. Possible disguises of these masquerading files can include commonly found programs, expected vendor executables and configuration files, and other commonplace application and naming conventions. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running those masquerading as legitimate functions. Applications and other files commonly found on Windows systems or in engineering workstations have been impersonated before. This can be as simple as renaming a file to effectively disguise it in the ICS environment. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-03 | 38 | Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat | ||
Details | Website | 2024-10-03 | 16 | SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More | ||
Details | Website | 2024-10-03 | 11 | Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems | ||
Details | Website | 2024-10-02 | 3 | Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity | ||
Details | Website | 2024-10-02 | 0 | 5,000 Fake Microsoft Emails that Your Employees Could Fall For - Check Point Blog | ||
Details | Website | 2024-10-02 | 0 | The Human Factor: Cisco’s 2022 Breach and the Art of Deception | ||
Details | Website | 2024-10-02 | 57 | Separating the bee from the panda: CeranaKeeper making a beeline for Thailand | ||
Details | Website | 2024-10-01 | 28 | SOC Simulator | MyDFIR: 30-Day SOC Analyst Challenge | ||
Details | Website | 2024-10-01 | 11 | VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection | ||
Details | Website | 2024-10-01 | 27 | Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble | ||
Details | Website | 2024-09-30 | 5 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva | ||
Details | Website | 2024-09-30 | 6 | Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | ||
Details | Website | 2024-09-30 | 0 | Social Engineering: The Fascination About This Method of Exploitation. | ||
Details | Website | 2024-09-30 | 32 | Hadooken and K4Spreader: The 8220 Gang's Latest Arsenal | ||
Details | Website | 2024-09-30 | 174 | Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware | ||
Details | Website | 2024-09-30 | 33 | MDR in Action: Preventing The More_eggs Backdoor From Hatching | ||
Details | Website | 2024-09-29 | 0 | Security’s Weakest Link | ||
Details | Website | 2024-09-27 | 0 | The Dumbest Thing in Security This Week: The Cute Things (Alleged) Cybercriminals Do | ||
Details | Website | 2024-09-27 | 1 | New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users | ||
Details | Website | 2024-09-27 | 0 | Top 6 Cloud Security Threats to Watch Out For | ||
Details | Website | 2024-09-27 | 5 | Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics | ||
Details | Website | 2024-09-27 | 2 | Blog 149 # Navigating the Cyber Frontier: Past, Present & Future Threats | ||
Details | Website | 2024-09-27 | 2 | The Rise of Octo2: Understanding the Latest Mobile Banking Threat | ||
Details | Website | 2024-09-27 | 1 | Cyber Attack news headlines trending on Google - Cybersecurity Insiders | ||
Details | Website | 2024-09-27 | 123 | Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs |