Common Information
Type | Value |
---|---|
Value |
Code Signing - T1116 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) However, adversaries are known to use code signing certificates to masquerade malware and tools as legitimate binaries (Citation: Janicab). The certificates used during an operation may be created, forged, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Code signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. Detection: Collect and analyze signing certificate metadata on software that executes within the environment to look for unusual certificate characteristics and outliers. Platforms: Windows, macOS Data Sources: Binary file metadata Defense Bypassed: Windows User Account Control |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-11-22 | 70 | Attack Signals Possible Return of Genesis Market, Abuses Node.js, and EV Code Signing | ||
Details | Website | 2023-11-22 | 69 | Attack Signals Possible Return of Genesis Market, Abuses Node.js, and EV Code Signing | ||
Details | Website | 2023-11-20 | 0 | Kaspersky's Advanced Persistent Threats Predictions for 2024 | ||
Details | Website | 2023-11-15 | 44 | GPT vs Malware Analysis: Challenges and Mitigations - Check Point Research | ||
Details | Website | 2023-11-13 | 9 | Rewterz Threat Alert – Bitter APT Group – Active IOCs | ||
Details | Website | 2023-11-09 | 6 | Red Canary Mac Monitor - An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research - RedPacket Security | ||
Details | Website | 2023-11-01 | 2 | 8 ANY.RUN Features you Need to Know About - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2023-10-26 | 0 | Increasing transparency in AI security | ||
Details | Website | 2023-10-25 | 6 | Rewterz Threat Alert – Bitter APT Group – Active IOCs | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-10-13 | 24 | An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit | ||
Details | Website | 2023-10-02 | 3 | swampUP 2023 Sessions Spotlight | ||
Details | Website | 2023-09-27 | 1 | macOS Threat Hunting: Unraveling RustBucket Malware Tactics | ||
Details | Website | 2023-09-27 | 27 | FakeBat Impersonates Midjourney, ChatGPT in Drive-by Cyberattacks | ||
Details | Website | 2023-09-20 | 2 | LUCR-3: Scattered Spider Getting SaaS-y in the Cloud | ||
Details | Website | 2023-09-13 | 31 | RedLine/Vidar Abuses EV Certificates, Shifts to Ransomware | ||
Details | Website | 2023-09-13 | 37 | RedLine/Vidar Abuses EV Certificates, Shifts to Ransomware | ||
Details | Website | 2023-09-08 | 2 | Secure Software Implementation in OWASP SAMM | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-08-20 | 70 | Bluepurple Pulse: week ending August 20th | ||
Details | Website | 2023-08-17 | 84 | Scattered Spider: The Modus Operandi | ||
Details | Website | 2023-08-15 | 4 | From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management | ||
Details | Website | 2023-08-11 | 39 | Stealthy Malicious MSI Loader - Overlapping Technique and Infrastructure with BatLoader - CYFIRMA | ||
Details | Website | 2023-08-10 | 0 | The CIA Triad & The Triple-A Model | ||
Details | Website | 2023-08-09 | 1 | China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign |