Common Information
Type | Value |
---|---|
Value |
Code Signing - T1116 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) However, adversaries are known to use code signing certificates to masquerade malware and tools as legitimate binaries (Citation: Janicab). The certificates used during an operation may be created, forged, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Code signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. Detection: Collect and analyze signing certificate metadata on software that executes within the environment to look for unusual certificate characteristics and outliers. Platforms: Windows, macOS Data Sources: Binary file metadata Defense Bypassed: Windows User Account Control |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 6 | Fake AI video generators infect Windows, macOS with infostealers | ||
Details | Website | 2024-11-13 | 2 | PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025 | ||
Details | Website | 2024-11-08 | 35 | Life on a crooked RedLine: Analyzing the infamous infostealer’s backend | ||
Details | Website | 2024-11-07 | 86 | BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence | ||
Details | Website | 2024-11-07 | 66 | European diplomats targeted by APT29 (Cozy Bear) with WINELOADER | ||
Details | Website | 2024-11-07 | 0 | Tech Analysis: CrowdStrike's Kernel Access and Security Architecture | ||
Details | Website | 2024-10-31 | 0 | CompTIA Security + 701 1.4 Public Key Infrastructure (PKI) | ||
Details | Website | 2024-10-31 | 17 | Building a Robust Windows Service for Malware and Ransomware Protection | ||
Details | Website | 2024-10-30 | 15 | Jumpy Pisces Engages in Play Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-30 | 0 | Apple Intelligence & Private Cloud Compute: Meet Unique Security | ||
Details | Website | 2024-10-24 | 2 | Securing Turbine Data Systems: The Latest in Cybersecurity Measures | ||
Details | Website | 2024-10-22 | 1 | Who is Jia Tan? What is a supply chain? Why? | ||
Details | Website | 2024-10-21 | 0 | Cybersecurity Awareness Month Quotes from Industry Experts in 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-18 | 8 | ESET partner breached to send data wipers to Israeli orgs | ||
Details | Website | 2024-10-17 | 100 | Flying in the clouds: APT31 renews its attacks on Russian companies through cloud storage | ||
Details | Website | 2024-10-17 | 75 | APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere | ||
Details | Website | 2024-10-11 | 93 | HijackLoader evolution: abusing genuine signing certificates | ||
Details | Website | 2024-10-10 | 15 | Jumpy Pisces Engages in Play Ransomware | ||
Details | Website | 2024-10-08 | 72 | Re-creating the Snake Rootkit Part 007: Rootkit Installation | ||
Details | Website | 2024-10-08 | 7 | EKUwu: Not just another AD CS ESC | ||
Details | Website | 2024-09-30 | 1 | Supply Chain Attacks: The Next Frontier in Cybersecurity Threats | ||
Details | Website | 2024-09-23 | 120 | Inside SnipBot: The Latest RomCom Malware Variant | ||
Details | Website | 2024-09-11 | 23 | Toneshell Backdoor Used to Target Attendees of the IISS Defence Summit | ||
Details | Website | 2024-09-09 | 25 | Exploring an Experimental Windows Kernel Rootkit in Rust | ||
Details | Website | 2024-09-09 | 41 | Earth Preta Evolves its Attacks with New Malware and Strategies |