Mitigation of this technique may be difficult and unadvised due to the the legitimate use of hidden files and directories.