Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
13 threats — page 1 of 1
Name Category Tags Description
Masquerading Defense Evasion Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or … Edit
Masquerading: Break Process Trees Defense Evasion An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent… Edit
Masquerading: Browser Fingerprint Defense Evasion Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attribute… Edit
Masquerading: Double File Extension Defense Evasion Adversaries may abuse a double extension in the filename as a means of masquerading the true file ty… Edit
Masquerading: Invalid Code Signature Defense Evasion Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceivi… Edit
Masquerading: Masquerade Account Name Defense Evasion Adversaries may match or approximate the names of legitimate accounts to make newly created ones app… Edit
Masquerading: Masquerade File Type Defense Evasion Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's f… Edit
Masquerading: Masquerade Task or Service Defense Evasion Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or … Edit
Masquerading: Match Legitimate Resource Name or Location Defense Evasion Adversaries may match or approximate the name or location of legitimate files, Registry keys, or oth… Edit
Masquerading: Overwrite Process Arguments Defense Evasion Adversaries may modify a process's in-memory arguments to change its name in order to appear as a le… Edit
Masquerading: Rename Legitimate Utilities Defense Evasion Adversaries may rename legitimate / system utilities to try to evade security mechanisms concerning … Edit
Masquerading: Right-to-Left Override Defense Evasion Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a stri… Edit
Masquerading: Space after Filename Defense Evasion Adversaries can hide a program's true filetype by changing the extension of a file. With certain fil… Edit