Throughout an operation, threat actors and groups need to be constantly aware of the environment they are in. Any false move could set off detections and alert defenders. Because of this, threat actors try to avoid being detected by leveraging a number of techniques designed specifically to evade detection solutions. Threat actors and groups can avoid detection via simple masquerading and indicator removal or use morecomplex techniques such as obfuscation and impairing of security solutions.