Dark Mode
Capec-669 Detail
Alteration of a Software Update
Standard Social Engineering Supply Chain Software Likelihood: Medium Typical Severity: High
Parents: 184
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-669 | capec | https://capec.mitre.org/data/definitions/669.html | |
| T1195.002 | ATTACK | https://attack.mitre.org/wiki/Technique/T1195/002 | Supply Chain Compromise: Compromise Software Supply Chain |
| REF-658 | reference_from_CAPEC | https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf | Defending Against Software Supply Chain Attacks, 2021--04, Cybersecurity and Infrastructure Security Agency (CISA) |
| REF-659 | reference_from_CAPEC | https://www.mitre.org/publications/technical-papers/deliver-uncompromised-securing-critical-software-supply-chains | Dr. Charles Clancy, Joe Ferraro, Robert A. Martin, Adam G. Pennington, Christopher L. Sledjeski, Dr. Craig J. Wiener, Deliver Uncompromised: Securing Critical Software Supply Chains, 2021--01, The MITRE Corporation |
| REF-660 | reference_from_CAPEC | https://docplayer.net/13041016-Supply-chain-attack-patterns-framework-and-catalog.html | Melinda Reed, John F. Miller, Paul Popick, Supply Chain Attack Patterns: Framework and Catalog, 2014--08, Office of the Assistant Secretary of Defense for Research and Engineering |
Explore
-
Identify software with frequent updates: The adversary must first identify a target software that has updates at least with some frequency, enough that there is am update infrastructure.
Experiment
-
Gain access to udpate infrastructure: The adversary must then gain access to the organization's software update infrastructure. This can either be done by gaining remote access from outside the organization, or by having a malicious actor inside the organization gain access. It is often easier if someone within the organization gains access.
Exploit
-
Alter the software update: Through access to the software update infrastructure, an adversary will alter the software update by injecting malware into the content of an outgoing update.
- An adversary would need to have penetrated an organization’s software update infrastructure including gaining access to components supporting the configuration management of software versions and updates related to the software maintenance of customer systems.
Not present
| High |
|---|
| Skills required include the ability to infiltrate the organization’s software update infrastructure either from the Internet or from within the organization, including subcontractors, and be able to change software being delivered to customer/user systems in an undetected manner. |
| Integrity | Authorization | Access Control | Confidentiality |
|---|---|---|---|
| Modify Data | Execute Unauthorized Commands | Gain Privileges | Read Data |
- A subcontractor to a software developer injects maliciously altered software updates into an automated update process that distributes to government and commercial customers software containing a hidden backdoor.