Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.
Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site)
- ATT&CK ID
- T1036
- STIX ID
- attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0
- Name
- Masquerading
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.T0074 - Masquerading
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.