Skip to content

T1655 Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.

Renaming abusable system utilities to evade security monitoring is also a form of Masquerading

Item Value
ID T1655
Sub-techniques T1655.001
Tactics TA0030
Platforms Android, iOS
Version 1.0
Created 12 July 2023
Last Modified 24 October 2025

Procedure Examples

ID Name Description
S1225 CherryBlos CherryBlos has displayed masqueraded wallet applications if the EnabledUIMode field is set to true. CherryBlos has also displayed a fake user interface while victims make withdrawals in the legitimate Binance application if the EnableExchange field is set to true. The withdrawal transaction is ultimately transferred to the threat actor’s controlled address.2
S1208 FjordPhantom FjordPhantom has masqueraded as legitimate banking applications.1
S1185 LightSpy LightSpy has masqueraded a Mach-O executable as a png file.43

Mitigations

ID Mitigation Description
M1011 User Guidance Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps.

References