Device Fingerprint Emulation

ID: TEQ-028
Phase(s): Defence Bypass
Tactic(s): Human Emulation

An adversary creates a fake digital fingerprint that disguises their genuine digital footprint by providing illicit information about the supporting software and framework types and versions. This allows them to hide their own identity and/or impersonate another person online.