Get a Pentest and security assessment of your IT network.

News

Masquerading

Adversaries may use masquerading to disguise a malicious application or executable as another file. Possible disguises include commonly found programs, expected vendor executables and configuration files. This can be as simple as renaming a file to effectively disguise it in the ICS environment. By impersonating expected and vendor-relevant files and applications, operators and engineers may not notice the presence of the underlying malicious content and possibly end up running the malicious programs masqueraded as legitimate functions. Use tools that restrict program execution via application control by attributes other than file name for common system and application utilities.”]

Source: https://collaborate.mitre.org/attackics/index.php/Technique/T0849

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin