Cloaking the Footprints: Hide Artifacts

🌐 Introduction

In the intricate dance between cyber adversaries and defenders, one of the most cunning maneuvers is concealing the very traces of intrusion. Imagine a burglar who not only avoids being seen but also erases every footprint, fingerprint, and hint they were ever there. In cybersecurity, this tactic has a name: MITRE ATT&CK Technique T1564 — Hide Artifacts.

This tactic is not a single maneuver, but a collection of subtle concealment approaches. It spans multiple operating systems, manipulates legitimate system features, and capitalizes on the fact that the best way to evade suspicion is to blend in—or vanish entirely.

Today, we’ll walk through each sub-technique in rich detail, examine realistic scenarios, and highlight defensive countermeasures.


🧩 Understanding the Core Concept

Hide Artifacts encompasses any activity where the threat actor deliberately masks elements of their presence to reduce the chance of discovery. This may involve altering file visibility, masking accounts, redirecting observation tools, or abusing system capabilities to operate in plain sight while being functionally invisible.

It’s important to stress that these aren’t crude cover-ups. The hallmark of T1564 is its reliance on features designed for legitimate use. Attackers simply redefine the intent of these features.


📂 T1564.001 – Hidden Files and Directories

🔍 Primary Objective: Disguise malicious storage objects from routine inspection.

Attackers exploit OS-level methods for suppressing file visibility.

  • Windows: attrib +h hides a file from Explorer.
  • Linux/macOS: Prefixing with . (dot) prevents normal listing without ls -a.

Example in Action: A backdoor payload is stored in a hidden subdirectory inside %APPDATA% with system and hidden attributes set. Most file browsers and some backup scripts will overlook it.

Defensive Playbook:

  • Regular integrity checks using tools that enumerate hidden entries.
  • Baseline directory snapshots to spot unexpected additions.

👤 T1564.002 – Hidden Users

👥 Primary Objective: Keep unauthorized accounts out of administrator view.

Windows Registry: Editing
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
with a value of 0 hides the account from the login screen.

macOS: Using dscl with IsHidden property hides accounts from System Preferences.

Operational Example: A stealth administrative account created after initial compromise is hidden from all visible user lists, but still functional for RDP logins.

Counter-Moves:

  • Enumerate user accounts via direct OS queries instead of GUI views.
  • Review event logs for account creation and group membership changes.

🪟 T1564.003 – Hidden Window

🖥 Primary Objective: Prevent visual cues of a malicious process.

Attackers can spawn applications without visible UI elements, using APIs or scripting flags.

  • Windows: Use of SW_HIDE in WinAPI.
  • Malware Behavior: TrickBot and other families have spawned hidden browsers for credential harvesting.

Defender’s Strategy:

  • Inspect process trees in memory, not just active windows.
  • Employ endpoint tools that monitor for headless executions.

📝 T1564.004 – NTFS File Attributes

📜 Primary Objective: Conceal data inside alternate data streams (ADS).

NTFS ADS allows data to be stored within a file without changing its apparent size.
For example:
type malware.exe > benign.txt:evil
The malicious content won’t appear in a standard file listing.

Defensive Insight:

  • Leverage dir /R or forensic tools to enumerate ADS.
  • Watch for files with unexpectedly large ADS segments.

💽 T1564.005 – Hidden File System

📦 Primary Objective: Store harmful payloads in unlisted storage areas.

Attackers can create virtual file systems or embed content within unused partitions.
Example: Rootkits that mount hidden volumes at runtime, accessible only to specific processes.

Detection Methods:

  • Disk imaging and raw sector analysis.
  • Compare OS-reported disk usage with actual physical capacity.

📧 T1564.008 – Email Hiding Rules

📩 Primary Objective: Prevent security alerts or incident communications from reaching defenders.

Threat actors set server-side mailbox rules to automatically delete, forward, or move certain emails. This could suppress notifications from security platforms.

Mitigation:

  • Monitor for mailbox rule creation or modification events.
  • Restrict permissions for self-service rule creation in high-value accounts.

🛑 T1564.011 – Ignore Process Interrupts

Primary Objective: Ensure processes persist despite system events.

Linux/macOS: nohup runs a process immune to hangups.
Windows: Certain PowerShell error suppression flags (-ErrorAction SilentlyContinue) keep malicious scripts from failing visibly.

Defensive Response:

  • Track process start events with unusual flags.
  • Use kernel-level auditing for persistent background tasks.

📂 T1564.012 – File/Path Exclusions

🚫 Primary Objective: Hide in “trusted” zones exempted from scanning.

If an attacker uploads tools into a folder excluded from antivirus scanning—either through policy manipulation or exploiting existing exclusions—the payload may never be scanned.

Preventative Measure:

  • Regularly audit AV exclusion lists.
  • Avoid blanket exclusions, particularly for writable directories.

🔗 T1564.013 – Bind Mounts

🔄 Primary Objective: Overlay malicious content with benign appearances.

On Linux, mount --bind can replace a directory’s view, making monitoring tools show sanitized data instead of the real files.

Detection:

  • Monitor mount and umount system calls.
  • Track sudden changes to /proc views.

🎨 T1564.009 – Resource Forking

🎭 Primary Objective: Exploit macOS resource forks to embed hidden material.

Resource forks, designed for metadata and alternate content, can store payloads undetected by traditional scanners.

Counteraction:

  • Tools like xattr and ls -l@ can enumerate extra file streams.
  • Forensic sweeps should parse fork data specifically.

🛠 T1564.006 – Run Virtual Instance

💡 Primary Objective: Operate within an isolated virtual environment invisible to the host OS.

An attacker may spin up a virtual machine or container inside a compromised endpoint to run tools without direct footprint on the main system.

Defensive Tactic:

  • Detect hypervisor driver loads or nested virtualization.
  • Correlate CPU usage spikes with absent process listings.

📚 T1564.007 – VBA Stomping

📑 Primary Objective: Disguise malicious macros by removing plain-text source code from Office documents, leaving only compiled p-code.

Mitigation:

  • Use tools that extract and decompile macro p-code.
  • Block macros from untrusted sources entirely.

🖋 T1564.010 – Process Argument Spoofing

Primary Objective: Launch commands with misleading argument strings to fool defenders inspecting process lists.

Example: A reverse shell may display as a harmless ping command in ps output by replacing argument values.

Defense:

  • Capture raw syscall arguments.
  • Use kernel event auditing to verify actual execution parameters.

📜 T1564.014 – Extended Attributes

🧾 Primary Objective: Hide data in file attributes rather than file content.

Extended attributes can hold large payloads invisible to basic content checks.

Mitigation:

  • Enumerate all attributes with forensic tools.
  • Apply strict write permissions to files where attributes are critical.

🧠 Why This Matters

T1564 is more than just a grab bag of hiding tricks. It represents a psychological game where attackers bet on defenders missing small anomalies in a sea of normal activity. The techniques are portable across industries, adaptable to multiple platforms, and—most critically—often work without breaking a single security policy on paper.


🛡 Defender’s Holistic Approach

1️⃣ Layered Monitoring

Combine file system auditing, process tracing, registry/watchpoint monitoring, and email rule inspections into a cohesive visibility framework.

2️⃣ Behavior-Based Detection

Signature matching alone won’t uncover a hidden user or mount overlay. Behavioral baselining and anomaly detection can reveal the subtle “off” moments.

3️⃣ Threat Hunting as Routine

Integrate hunts for hidden artifacts into weekly or monthly operational cycles—don’t wait for an alert.

4️⃣ User Awareness

Educate technical staff on where to check beyond the GUI—many of these methods rely on the defender only using surface-level tools.


🏁 Conclusion

Hide Artifacts (T1564) is the cybersecurity equivalent of a magician’s sleight of hand. Adversaries don’t always need to dodge every spotlight; they just need to be standing where no one is looking. Defenders who develop the reflex to look in the unlit corners—hidden directories, ADS, excluded folders, unlisted accounts—will stand a far better chance of unmasking these ghostly intrusions.

Leave a comment

I’m Rinzl3r

Hello! I’m Matthew, an experienced engineer at Decian, a leading Managed Service Provider (MSP) dedicated to revolutionizing IT solutions for businesses. With a passion for technology and a wealth of experience in the MSP industry, I’ve embarked on a journey to demystify the world of managed services through this blog.

My career at Decian has been a journey of constant learning and growth. Over the years, I’ve honed my skills in various aspects of IT management, from network security and cloud services to data analytics and cybersecurity. Working in an environment that fosters innovation and customer-focused solutions, I’ve had the privilege of contributing to numerous projects that have helped businesses optimize their IT strategies and enhance operational efficiency.

The inspiration to start this blog came from my interactions with business owners and clients who often expressed a need for clearer understanding and guidance in working with MSPs. Whether it’s navigating the complexities of digital transformation, ensuring cybersecurity, or leveraging technology for business growth, I realized that there’s a wealth of knowledge to be shared.

Through this blog, I aim to bridge the gap between MSPs and their clients. My goal is to provide insights, tips, and practical advice that can help business owners make informed decisions about their IT needs and how best to collaborate with an MSP like Decian. From explaining basic concepts to exploring advanced IT solutions, I strive to make this space a valuable resource for both seasoned professionals and those new to the world of managed services.

Join me on this informative journey, as we explore the dynamic and ever-evolving world of MSPs. Whether you’re an MSP client, a business owner, or just curious about the role of technology in business today, I hope to make this blog your go-to source for all things MSP.

Welcome to the blog, and let’s unravel the complexities of managed IT services together!

Let’s connect