APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

T1036 - Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate t...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.

Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site)

ATT&CK ID
T1036
STIX ID
attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0
Name
Masquerading
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

AML.T0074 - Masquerading

Confidence: 1.00
Kindatlas_techniqueLink typesame_or_related_attack_techniqueMethodexact_attack_external_id

Source

Where this page information comes from.