Common Information
Type Value
Value
Code Signing - T1116
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) However, adversaries are known to use code signing certificates to masquerade malware and tools as legitimate binaries (Citation: Janicab). The certificates used during an operation may be created, forged, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Code signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. Detection: Collect and analyze signing certificate metadata on software that executes within the environment to look for unusual certificate characteristics and outliers. Platforms: Windows, macOS Data Sources: Binary file metadata Defense Bypassed: Windows User Account Control
Details Published Attributes CTI Title
Details Website 2023-08-09 1 China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign
Details Website 2023-08-08 1 RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale | Recorded Future
Details Website 2023-08-06 0 Supply Chain Attacks in OT Environments: Safeguarding Against Hidden Threats
Details Website 2023-08-04 2 8 Black Hat sessions you don’t want to miss
Details Website 2023-08-03 0 What are the top LLM security risks of AI?
Details Website 2023-08-02 31 Investigating Intrusions From Intriguing Exploits
Details Website 2023-08-01 0 Securing IoT Devices from Cybersecurity Threats: Securing the Internet of Things.
Details Website 2023-07-31 4 Rewterz Threat Alert – Bitter APT Group – Active IOCs
Details Website 2023-07-30 4 Analysis on DarkSide Ransomware — Part 1
Details Website 2023-07-27 117 Healthcare Threat Landscape 2022-2023: Common TTPs Used by Top Ransomware Groups Targeting the Healthcare Sector
Details Website 2023-07-25 6 APT Profile: Kimsuky - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-07-23 4 Create and Deploy Signed WDAC Windows Defender Policy
Details Website 2023-07-23 6 WDAC policy for BYOVD Kernel mode only protection
Details Website 2023-07-19 434 Want to make sure inherited laptop is clean of viruses, malware - Virus, Trojan, Spyware, and Malware Removal Help
Details Website 2023-07-18 12 What Are LOLBins? - SOC Prime
Details Website 2023-07-18 1 Identify Suspicious or Tampered Files Faster with Digital Signatures  
Details Website 2023-07-13 1 Malicious Microsoft Drivers Could Number in the Thousands: Cisco Talos
Details Website 2023-07-12 0 Hackers exploit Windows policy to load malicious kernel drivers - RedPacket Security
Details Website 2023-07-12 0 AWS Security Pillar: A Well-Architected Cloud Environment
Details Website 2023-07-11 2 Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver Signatures
Details Website 2023-07-11 2 Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver Signatures - RedPacket Security
Details Website 2023-07-11 3 Protecting Digital Signatures
Details Website 2023-07-11 0 Hackers exploit Windows policy to load malicious kernel drivers
Details Website 2023-07-11 0 Hackers exploit Windows policy to load malicious kernel drivers
Details Website 2023-07-11 19 Hunting for A New Stealthy Universal Rootkit Loader