Data Classification Evasion

medium

data-classification-evasion

Attacker structures, encodes, or obfuscates sensitive data to evade automated detection and classification systems

TamperingInformation Disclosure

MITRE ATT&CK techniques

IDNameTactic
T1027 Obfuscated Files or Information Defense Evasion
T1567 Exfiltration Over Web Service Exfiltration

Common Weakness Enumeration

Mitigating controls

ctrl-classify-1
Implement multiple detection methods (pattern, ML, context-aware)
ctrl-classify-2
Monitor for encoding and obfuscation patterns
ctrl-classify-3
Apply classification at multiple points in data lifecycle
ctrl-classify-4
Regularly update detection rules and patterns
ctrl-classify-5
Implement human review for edge cases and anomalies

References