Dark Mode

Settings

Capec-442 Detail

Infected Software

Standard Software Likelihood: Medium Typical Severity: High

Parents: 441

Children: 448

Threats: T79 T287 T337 T391 T406

Description

An adversary adds malicious logic, often in the form of a computer virus, to otherwise benign software. This logic is often hidden from the user of the software and works behind the scenes to achieve negative impacts. Many times, the malicious logic is inserted into empty space between legitimate code, and is then called when the software is executed. This pattern of attack focuses on software already fielded and used in operation as opposed to software that is still under development and part of the supply chain.

Not present

External ID Source Link Description
CAPEC-442 capec https://capec.mitre.org/data/definitions/442.html
CWE-506 cwe http://cwe.mitre.org/data/definitions/506.html
T1195.001 ATTACK https://attack.mitre.org/wiki/Technique/T1195/001 Supply Chain Compromise: Compromise Software Dependencies and Development Tools
T1195.002 ATTACK https://attack.mitre.org/wiki/Technique/T1195/002 Supply Chain Compromise: Compromise Software Supply Chain
REF-387 reference_from_CAPEC http://www.mindpride.net/root/Extras/how-stuff-works/how_computer_viruses_work.htm Marshall Brain, How Computer Viruses Work, 2007, MindPride

Not present

  1. Access to the software currently deployed at a victim location. This access is often obtained by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.

Not present

Not present

Authorization
Execute Unauthorized Commands

Not present