Cybersecurity is an ongoing battle between attack and defense, and the attackers continue to pose novel challenges. In addition to using obfuscation, steganography, and malware packing techniques, threat actors today frequently take advantage of legitimate services, platforms, protocols, and tools to conduct their activities. Here are five tactics cybercriminals are using to cover their tracks today: Abusing trusted platforms that wont raise alarms that may look clean to human analysts and machines alike.”]
Source: https://www.csoonline.com/article/3617983/5-ways-hackers-hide-their-tracks.html