Skip to content

Hide Navigation Hide TOC

Disguise Root/Jailbreak Indicators - T1408 (b332a960-3c04-495a-827f-f17a5daed3a6)

An adversary could use knowledge of the techniques used by security software to evade detection(Citation: Brodie)(Citation: Tan). For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed "su" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection(Citation: Rastogi).

Cluster A Galaxy A Cluster B Galaxy B Level
Disguise Root/Jailbreak Indicators - T1408 (b332a960-3c04-495a-827f-f17a5daed3a6) Attack Pattern Disguise Root/Jailbreak Indicators - T1630.003 (a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9) Attack Pattern 1
Indicator Removal on Host - T1630 (0d4e3bbb-7af5-4c88-a215-0c0906bc1e8d) Attack Pattern Disguise Root/Jailbreak Indicators - T1630.003 (a91262d5-b9ff-463f-b8d2-12e4ea1eb3c9) Attack Pattern 2