Get a Pentest and security assessment of your IT network.

News

Masquerading

Adversaries may use masquerading to disguise a malicious application or executable as another file. Possible disguises include commonly found programs, expected vendor executables and configuration files. This can be as simple as renaming a file to effectively disguise it in the ICS environment. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running the malicious programs masqueraded as legitimate functions. Use tools that restrict program execution via application control by attributes other than file name for common system and application utilities.”]

Source: https://collaborate.mitre.org/attackics/index.php/Technique/T0849

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks