Critical Infrastructure Cybersecurity Framework
T1036Defense Evasion3 Mitigations

Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign.

Description

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Code SigningExecution PreventionRestrict File and Directory Permissions

Quick Info

Technique ID
T1036
Sub-Techniques
12
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.