ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: AF022.001
  • Created: 20th May 2025
  • Updated: 01st November 2025
  • Platforms: WindowsLinuxMacOS
  • MITRE ATT&CK®: T1564.006T1564
  • Contributor: The ITM Team

Use of a Virtual Machine

The subject uses a virtual machine (VM) on an organization device to contain artifacts of forensic value within the virtualized environment, preventing them from being written to the host file system. This strategy helps to obscure evidence and complicate forensic investigations.
 

By running a guest operating system within a VM, the subject can potentially evade detection by security agents installed on the host operating system, as these agents may not have visibility into activities occurring within the VM. This adds an additional layer of complexity to forensic analysis, making it more challenging to detect and attribute malicious activities.