T1685.003 - Modify or Spoof Tool UI

Sub-technique
Tattiche:
Defense Impairment
Piattaforme:
Linux macOS Windows
Rilevamento:
Not specified
Description:
Adversaries may spoof or manipulate security tool user interfaces (UIs) to falsely indicate tools are functioning normally and delay detection and response.

Adversaries may present misleading or falsified security tool interfaces (UIs) that display normal or healthy status indicators, even when underlying security tools have been disabled, degraded, or otherwise tampered with. Security tools typically provide visibility into system health, alerting, and operational status; by misrepresenting this information, adversaries can undermine defender trust in these signals and obscure the true security posture of the system.

This behavior is often used in conjunction with efforts to disable or modify tools, where adversaries first impair the functionality of defenses (e.g., EDR, logging agents) and then replace or mimic their interfaces to conceal the loss of visibility. By maintaining the appearance of normal operations, such as showing active protection, successful updates, or absence of threats, adversaries can delay investigation and response, enabling continued malicious activity.

For example, adversaries may display a fake Windows Security interface or system tray icon indicating a “protected” or “healthy” state after disabling Windows Defender or related services.(Citation: BlackBasta)
Malware (1)
Metadata
MITRE ID: T1685.003
STIX ID: attack-pattern--0ff4bd68-aebb-...
Piattaforme: Linux, macOS, Windows
Created: 28/04/2026 16:00
Updated: 01/05/2026 16:00