Skip to content

Info

ID: AT-DC006.001
Technique: Masquerading
Tactic: Deepening Control
Platforms: Linux, macOS, Windows, IaaS
Defense Bypassed: Static Analysis, Signature-based Detection
Version: 1.0

Match Legitimate Name or Location

Attackers employ the "Match Legitimate Name or Location" subtechnique during the Deepening Control phase to conceal their malicious components by deliberately naming them to closely resemble legitimate system files, libraries, or services within the application environment. This subtechnique involves strategic placement of malicious code in locations that mirror authentic system directories or using naming conventions that closely mimic trusted components (such as "kerne1.dll" instead of "kernel.dll" or placing malicious scripts in recognized system paths). By leveraging users' and security tools' inherent trust in familiar names and standard locations, attackers effectively evade detection while establishing persistence. Security controls that rely on filename patterns or standard directory structures for threat detection may overlook these disguised components, allowing attackers to maintain their foothold and extend their control over the compromised application environment while appearing as legitimate system functionality.

Procedure Examples

ID Name Description
AC-0001 ByBit $1.5B Crypto Heist With a stolen AWS key, the attackers over-wrote Safe {Wallet}’s production JavaScript bundle (_app-.js) in the very same S3 object key that serves app.safe.global.

Mitigations

ID Mitigation Description
M1022 Restrict File and Directory Permissions Implement strict permissions on system directories to prevent unauthorized file placement
M1045 Code Signing Implement code signing verification to identify unsigned files masquerading as legitimate components
M1040 Behavior Prevention Deploy runtime detection solutions that analyze file behavior beyond filename patterns

Detection

ID Data Source Detection
DS0009 Process Metadata Alert when trusted binary names (svchost.exe, lsass.exe, nginx, etc.) run from user-writable or otherwise non-standard directories – a classic name-masquerading indicator.
DS0009 Process Metadata Analyze filenames for typosquatting and similarity to legitimate system files.
DS0022 File Creation & Metadata Detect newly written executables whose filename imitates a core system binary yet whose hash / signer is absent from the golden-image inventory. Raise priority when the file resides outside approved software-distribution paths.
DS0040 Malware Repository Submit every new or modified executable that matches a trusted filename to threat-intel/AV sandboxes; quarantine if its SHA-256, SSDEEP, or YARA signature aligns with known malware families that use masquerading.
CADR001 Execution Stack Trace CADR records the call-stack for file creation events. Raise an alert when an executable bearing a trusted system name is written by a code path not on the allow-list. Anomalous creators of legitimate-looking filenames strongly indicate masquerading or tampering.