隐藏伪装指攻击者通过操纵系统资源或环境特性来掩盖恶意行为痕迹的技术手段,其核心目标是规避安全检测与取证分析。该技术涵盖文件隐藏、进程伪装、虚拟化隔离等多种实现方式,常被用于持久化控制、横向移动等攻击阶段。传统防御措施主要依赖文件完整性监控、进程行为分析和元数据校验等手段,通过检测异常资源访问模式或属性变更来识别隐匿行为。
为对抗日益完善的检测体系,攻击者发展出多层嵌套的隐蔽技术体系,通过文件系统特性滥用、内存操作优化、虚拟化环境感知等创新手法,构建出"无文件、无进程、无痕迹"的新型隐匿范式。这些技术突破传统存储介质与运行环境的约束,实现攻击痕迹的多维度消隐。
现有隐藏伪装匿迹技术的共性特征体现在三个层面:在存储维度,突破文件系统表层结构,利用数据流、内存页、注册表项等非标区域构建隐蔽存储空间;在运行维度,通过上下文劫持、环境伪装等技术将恶意代码融入合法进程或系统服务;在时间维度,采用时间线混淆、日志注入等手段破坏事件取证的可追溯性。具体而言,文件系统流隐藏技术重新定义了恶意文件的存储范式,将攻击载荷深度绑定系统合法对象;进程内存驻留伪装创新了代码执行模式,实现运行时痕迹的最小化留存;虚拟化沙箱逃逸技术构建了环境感知的动态对抗能力;元数据时间戳篡改则颠覆了传统取证分析的时序基础。这些技术的协同应用,使得攻击痕迹呈现"物理存储不可见、运行过程不可察、时间线索不可信"的三重隐匿特性。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ✅ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
攻击者通过文件属性伪装和进程上下文劫持,使恶意对象呈现合法特征。例如将恶意文件隐藏在系统目录结构深层、仿冒系统服务名称创建进程,或修改注册表键值匹配合法配置模式。这些手法使得恶意对象在表面特征层面与正常系统组件高度相似,规避基于命名规则或路径特征的检测。
利用虚拟化隔离技术创建独立于宿主系统的执行环境,使安全监控工具无法感知隔离域内的恶意操作。通过硬件辅助虚拟化构建的隐蔽通道,攻击者可在不触发系统告警的前提下实施敏感操作,形成"观测盲区"。
采用加密存储和内存动态解密技术,确保恶意载荷仅在运行时显形。通过NTFS加密数据流、BitLocker加密容器或自定义内存加密协议,保护攻击数据在静态存储和网络传输过程中的机密性。
通过时间戳篡改和日志注入,破坏攻击事件的时间关联性。攻击者构造跨时区的时间标记或插入伪造的日志条目,使得防御方难以准确还原攻击时间线,同时利用持久化机制将攻击周期延长至数月,稀释单次行为的检测概率。
| ID | Name | Description |
|---|---|---|
| S0482 | Bundlore |
Bundlore uses the |
| S1066 | DarkTortilla |
DarkTortilla has used |
| S0402 | OSX/Shlayer |
OSX/Shlayer has used the |
| S1011 | Tarrask |
Tarrask is able to create "hidden" scheduled tasks by deleting the Security Descriptor ( |
| S0670 | WarzoneRAT |
WarzoneRAT can masquerade the Process Environment Block on a compromised host to hide its attempts to elevate privileges through |
| ID | Mitigation | Description |
|---|---|---|
| M1049 | Antivirus/Antimalware |
Review and audit file/folder exclusions, and limit scope of exclusions to only what is required where possible.[7] |
| M1013 | Application Developer Guidance |
Application developers should consider limiting the requirements for custom or otherwise difficult to manage file/folder exclusions. Where possible, install applications to trusted system folder paths that are already protected by restricted file and directory permissions. |
| M1033 | Limit Software Installation |
Restrict the installation of software that may be abused to create hidden desktops, such as hVNC, to user groups that require it. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0015 | Application Log | Application Log Content |
Monitor for third-party application logging, messaging, and/or other artifacts that may attempt to hide artifacts associated with their behaviors to evade detection. |
| DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may attempt to hide artifacts associated with their behaviors to evade detection. |
| DS0022 | File | File Creation |
Monitor for newly constructed files that may attempt to hide artifacts associated with their behaviors to evade detection. |
| File Metadata |
Monitor for contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/owner, permissions that may attempt to hide artifacts associated with their behaviors to evade detection. |
||
| File Modification |
Monitor for changes made to files that may attempt to hide artifacts associated with their behaviors to evade detection. |
||
| DS0001 | Firmware | Firmware Modification |
Monitor for changes made to firewall rules for unexpected modifications to allow/block specific network traffic that may attempt to hide artifacts associated with their behaviors to evade detection. |
| DS0009 | Process | OS API Execution |
Monitor for API calls that may attempt to hide artifacts associated with their behaviors to evade detection. |
| Process Creation |
Monitor newly executed processes that may attempt to hide artifacts associated with their behaviors to evade detection. |
||
| DS0012 | Script | Script Execution |
Monitor for any attempts to enable scripts running on a system would be considered suspicious. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible to determine their actions and intent. |
| DS0019 | Service | Service Creation |
Monitor for newly constructed services/daemons that may attempt to hide artifacts associated with their behaviors to evade detection. |
| DS0002 | User Account | User Account Creation |
Monitor for newly constructed user accounts that may attempt to hide artifacts associated with their behaviors to evade detection. |
| User Account Metadata |
Monitor for contextual data about an account, which may include a username, user ID, environmental data that may attempt to hide artifacts associated with their behaviors to evade detection. |
||
| DS0024 | Windows Registry | Windows Registry Key Modification |
Monitor for changes made to windows registry keys and/or values that may attempt to hide artifacts associated with their behaviors to evade detection. |