Skip to content

Match Legitimate Name or Location

Attackers employ the "Match Legitimate Name or Location" subtechnique during the Deepening Control phase to conceal their malicious components by deliberately naming them to closely resemble legitimate system files, libraries, or services within the application environment. This subtechnique involves strategic placement of malicious code in locations that mirror authentic system directories or using naming conventions that closely mimic trusted components (such as "kerne1.dll" instead of "kernel.dll" or placing malicious scripts in recognized system paths). By leveraging users' and security tools' inherent trust in familiar names and standard locations, attackers effectively evade detection while establishing persistence. Security controls that rely on filename patterns or standard directory structures for threat detection may overlook these disguised components, allowing attackers to maintain their foothold and extend their control over the compromised application environment while appearing as legitimate system functionality.