Common Information
Type Value
Value
Masquerading
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may use masquerading to disguise a malicious application or executable as another file, to avoid operator and engineer suspicion. Possible disguises of these masquerading files can include commonly found programs, expected vendor executables and configuration files, and other commonplace application and naming conventions. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running those masquerading as legitimate functions. Applications and other files commonly found on Windows systems or in engineering workstations have been impersonated before. This can be as simple as renaming a file to effectively disguise it in the ICS environment.
Details Published Attributes CTI Title
Details Website 2024-10-03 38 Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Details Website 2024-10-03 16 SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Details Website 2024-10-03 11 Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Details Website 2024-10-02 3 Stopping Attacks Early: The Power of Endpoint Telemetry in Cybersecurity
Details Website 2024-10-02 0 5,000 Fake Microsoft Emails that Your Employees Could Fall For - Check Point Blog
Details Website 2024-10-02 0 The Human Factor: Cisco’s 2022 Breach and the Art of Deception
Details Website 2024-10-02 57 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
Details Website 2024-10-01 28 SOC Simulator | MyDFIR: 30-Day SOC Analyst Challenge
Details Website 2024-10-01 11 VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection
Details Website 2024-10-01 27 Silent Intrusion: Unraveling The Sophisticated Attack Leveraging VS Code For Unauthorized Access - Cyble
Details Website 2024-09-30 5 Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters | Imperva
Details Website 2024-09-30 6 Trouble in Da Hood: Malicious Actors Use Infected PyPI Packages to Target Roblox Cheaters
Details Website 2024-09-30 0 Social Engineering: The Fascination About This Method of Exploitation.
Details Website 2024-09-30 32 Hadooken and K4Spreader: The 8220 Gang's Latest Arsenal
Details Website 2024-09-30 174 Nitrogen Campaign Drops Sliver and Ends With BlackCat Ransomware
Details Website 2024-09-30 33 MDR in Action: Preventing The More_eggs Backdoor From Hatching
Details Website 2024-09-29 0 Security’s Weakest Link
Details Website 2024-09-27 0 The Dumbest Thing in Security This Week: The Cute Things (Alleged) Cybercriminals Do
Details Website 2024-09-27 1 New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Details Website 2024-09-27 0 Top 6 Cloud Security Threats to Watch Out For
Details Website 2024-09-27 5 Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics
Details Website 2024-09-27 2 Blog 149 # Navigating the Cyber Frontier: Past, Present & Future Threats
Details Website 2024-09-27 2 The Rise of Octo2: Understanding the Latest Mobile Banking Threat
Details Website 2024-09-27 1 Cyber Attack news headlines trending on Google - Cybersecurity Insiders
Details Website 2024-09-27 123 Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse — Elastic Security Labs