Defense Evasion

Type: tactic

Description: The adversary is trying to avoid being detected by security software and native controls.

Version: 0.1.0

Created At: 2024-10-11 16:54:32 +0300

Last Modified At: 2024-10-11 16:54:32 +0300

Tactic Order: 7


External References

  • <-- Indirect Data Access (technique): An adversary can extract full documents through the RAG circumventing data security controls.
  • <-- Distraction (technique): An adversary can avoid detection by combining benign instructions with their malicious ones.
  • <-- Citation Silencing (technique): An adversary can bypass security mechanisms and audit logs that rely on citations.
  • <-- Blank Image (technique): An adversary can avoid raising suspicion by avoiding rendering an image to carry exfiltrated data.
  • <-- Conditional Execution (technique): An adversary can limit their attack to their specified targets to reduce their detection surface.
  • <-- URL Familiarizing (technique): An adversary can bypass security mechanisms to allow future data exfiltration through URL in an attacker-controlled domain.
  • <-- Delayed Execution (technique): An adversary can bypass controls and evade detection by delaying the execution of their malicious instructions..
  • <-- ASCII Smuggling (technique): An adversary can avoid raising user suspicion.
  • <-- RAG Injection (technique): An adversary can inject RAG results that are treated by the AI system as authentic.
  • <-- These Aren't The Droids (technique): An adversary can avoid raising suspicion by hiding malicious instructions and their implications from the user.