ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: AF012
  • Created: 25th May 2024
  • Updated: 14th June 2024
  • Contributor: The ITM Team

Hide Artifacts

A subject may attempt to hide artifacts associated with their behaviors to evade or delay detection.

Subsections

ID Name Description
AF012.003Hidden File System

A subject may use their own abstracted file system, separate from the standard file system. In doing so, insiders can hide the presence of malicious components and file input/output from security tools.

AF012.001Hidden Files and Directories

A subject may set files and directories to be hidden to evade detection mechanisms or delay investigators.

AF012.002Hide Emails With Rules

A subject may utilize email rules can be used to automatically move emails from an inbox to obscure locations, with the goal of hiding them from immediate view, delaying identification.