Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF008
- Created: 25th May 2024
- Updated: 10th February 2025
- Contributors: The ITM Team, James Weston,
Steganography
A subject may use steganography methods to attempt to discretely exfiltrate data.
Steganography is the practice of concealing information within other, seemingly innocuous data to prevent detection. Unlike encryption, which obscures the content of a message, steganography hides the very existence of the message. This technique can be employed by insiders to exfiltrate sensitive data without raising suspicion.
Common Steganographic Techniques:
- Images: Data is embedded in image files (e.g., JPEG, BMP) by modifying least significant bits (LSB) of pixel values, maintaining visual integrity.
- Audio/Video: Hidden payloads are encoded within audio or video data streams, leveraging high data density for concealment.
- Text: Information is embedded through subtle alterations, such as extra spaces, character substitutions, or font variations.
Subsections (1)
| ID | Name | Description | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| AF008.001 | Image Steganography | A subject embeds data within image files to hide sensitive content and exfiltrate it, in a way that conceals both the data and the act of exfiltration. Unlike encryption alone, this attempts to hide the existence of the data.
Trade-offs
|