Search Evasion Techniques
Names, Techniques, Definitions, Keywords
Search Result
2 item(s) found so far for this keyword.
Subvert Trust Controls: Code Signing Defense Evasion [Mitre]
Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. The certificates used during an operation may be created, acquired, or stolen by the adversary. Unlike Invalid Code Signature, this activity …
Stolen certificate Antivirus/EDR Evasion
To avoid detection, attackers can use stolen certificates from known companies. It allows the malware to bypass security solution.