ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: AF012.003
  • Created: 25th May 2024
  • Updated: 23rd October 2025
  • MITRE ATT&CK®: T1564.005T1564
  • Contributor: The ITM Team

Hidden File System

A subject may use their own abstracted file system, separate from the standard file system. In doing so, insiders can hide the presence of malicious components and file input/output from security tools.