Dark Mode
Capec-186 Detail
Malicious Software Update
Standard Social Engineering Supply Chain Software Typical Severity: High
Parents: 184
Children: 187 533 614 657
Threats: T62 T79 T257 T260 T262 T269 T270 T271 T272 T273 T287 T290 T301 T304 T306 T337 T391 T406
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-186 | capec | https://capec.mitre.org/data/definitions/186.html | |
| CWE-494 | cwe | http://cwe.mitre.org/data/definitions/494.html | |
| T1195.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1195/002 | Supply Chain Compromise: Compromise Software Supply Chain |
| REF-697 | reference_from_CAPEC | https://www.microsoft.com/security/blog/2017/06/27/new-ransomware-old-techniques-petya-adds-worm-capabilities/ | Microsoft Defender Security Research Team, New ransomware, old techniques: Petya adds worm capabilities, 2017, Microsoft |
Explore
-
Identify target: The adversary must first identify what they want their target to be. Because malicious software updates can be carried out in a variety of ways, the adversary will first not only identify a target program, but also what users they wish to target. This attack can be targeted (a particular user or group of users) or untargeted (many different users).
Experiment
-
Craft a deployment mechanism based on the target: The adversary must craft a deployment mechanism to deploy the malicious software update. This mechanism will differ based on if the attack is targeted or untargeted.
| Techniques |
|---|
| Targeted attack: hosting what appears to be a software update, then harvesting actual email addresses for an organization, or generating commonly used email addresses, and then sending spam, phishing, or spear-phishing emails to the organization's users requesting that they manually download and install the malicious software update. |
| Targeted attack: Instant Messaging virus payload, which harvests the names from a user's contact list and sends instant messages to those users to download and apply the update |
| Untargeted attack: Spam the malicious update to as many users as possible through unsolicited email, instant messages, or social media messages. |
| Untargeted attack: Send phishing emails to as many users as possible and pretend to be a legitimate source suggesting to download an important software update. |
| Untargeted attack: Use trojans/botnets to aid in either of the two untargeted attacks. |
Exploit
-
Deploy malicious software update: Using the deployment mechanism from the previous step, the adversary gets a user to install the malicious software update.
Not present
- Manual or user-assisted attacks require deceptive mechanisms to trick the user into clicking a link or downloading and installing software. Automated update attacks require the adversary to host a payload and then trigger the installation of the payload code.
| High |
|---|
| This attack requires advanced cyber capabilities |
| Availability | Access Control | Confidentiality |
|---|---|---|
| Execute Unauthorized Commands (Utilize the built-in software update mechanisms of the commercial components to deliver software that could compromise security credentials, enable a denial-of-service attack, or enable tracking.) | Execute Unauthorized Commands (Utilize the built-in software update mechanisms of the commercial components to deliver software that could compromise security credentials, enable a denial-of-service attack, or enable tracking.) | Execute Unauthorized Commands (Utilize the built-in software update mechanisms of the commercial components to deliver software that could compromise security credentials, enable a denial-of-service attack, or enable tracking.) |
- Using an automated process to download and install dangerous code was key part of the NotPeyta attack [REF-697]