Data Classification Evasion
mediumdata-classification-evasion
Attacker structures, encodes, or obfuscates sensitive data to evade automated detection and classification systems
TamperingInformation Disclosure
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1027 | Obfuscated Files or Information | Defense Evasion |
| T1567 | Exfiltration Over Web Service | Exfiltration |
Common Weakness Enumeration
Mitigating controls
ctrl-classify-1- Implement multiple detection methods (pattern, ML, context-aware)
ctrl-classify-2- Monitor for encoding and obfuscation patterns
ctrl-classify-3- Apply classification at multiple points in data lifecycle
ctrl-classify-4- Regularly update detection rules and patterns
ctrl-classify-5- Implement human review for edge cases and anomalies