Remove bash-malware-tactics
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). The most widespread steg tactics are crude and involve using fake file extensions or file headers that are subsequently stripped by another component. Malware Details.

Malware 96
article thumbnail

Dealing with MITRE ATT&CK®’s different levels of detail

Lacework

In this blog post, we attempt to answer the question: from the perspective of a Detection Engineering team, which techniques do we need to focus on and which can we safely ignore? Unsurprisingly, all of these techniques lie within the Pre-ATT&CK tactics of Reconnaissance and Resource Development.

Malware 113