Dark Mode
Capec-444 Detail
Development Alteration
Standard Supply Chain Software Hardware Likelihood: Medium Typical Severity: High
Parents: 438
Children: 206 443 445 446 511 516 520 532 537 538 539 670 672 673 678
Threats: T62 T68 T274 T393
An adversary modifies a technology, product, or component during its development to acheive a negative impact once the system is deployed. The goal of the adversary is to modify the system in such a way that the negative impact can be leveraged when the system is later deployed. Development alteration attacks may include attacks that insert malicious logic into the system's software, modify or replace hardware components, and other attacks which negatively impact the system during development. These attacks generally require insider access to modify source code or to tamper with hardware components. The product is then delivered to the user where the negative impact can be leveraged at a later time.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-444 | capec | https://capec.mitre.org/data/definitions/444.html |
Not present
- Access to the system during the development phase to alter and/or modify software and hardware components. This access is often obtained via insider access or by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.
Not present
Not present
| Integrity | Availability | Authorization |
|---|---|---|
| Alter Execution Logic | Unreliable Execution | Execute Unauthorized Commands |
Not present