Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.