Common Information
Type | Value |
---|---|
Value |
Code Signing - T1116 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) However, adversaries are known to use code signing certificates to masquerade malware and tools as legitimate binaries (Citation: Janicab). The certificates used during an operation may be created, forged, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Code signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. Detection: Collect and analyze signing certificate metadata on software that executes within the environment to look for unusual certificate characteristics and outliers. Platforms: Windows, macOS Data Sources: Binary file metadata Defense Bypassed: Windows User Account Control |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-04-19 | 11 | MacOS Targeted by LockBit Ransomware | ||
Details | Website | 2023-04-16 | 51 | The LockBit ransomware (kinda) comes for macOS | ||
Details | Website | 2023-04-13 | 14 | These Are The Drivers You Are Looking For: Detect and Prevent Malicious Drivers | ||
Details | Website | 2023-04-07 | 1 | Cyber Security Today, Week in Review for the week ending Friday, April 7, 2023 | IT World Canada News | ||
Details | Website | 2023-04-06 | 32 | Gatekeeping in macOS: Keeping adversaries off our Apples | ||
Details | Website | 2023-04-03 | 1 | Step -By-Step Procedure To Set Up An Enterprise Root CA On Windows Server | ||
Details | Website | 2023-04-02 | 22 | Apk.Sh - Makes Reverse Engineering Android Apps Easier, Automating Some Repetitive Tasks Like Pulling, Decoding, Rebuilding And Patching An APK - RedPacket Security | ||
Details | Website | 2023-04-01 | 10 | Ironing out (the macOS) details of a Smooth Operator (Part II) | ||
Details | Website | 2023-03-31 | 4 | 10-year-old Windows bug with 'opt-in' fix exploited in 3CX attack | ||
Details | Website | 2023-03-30 | 0 | 3CX Supply Chain Compromise - Security Intelligence | Field Effect | ||
Details | Website | 2023-03-30 | 24 | SmoothOperator Supply Chain Attack Targeting 3CX VOIP Desktop Client | ||
Details | Website | 2023-03-30 | 0 | 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component | ||
Details | Website | 2023-03-29 | 55 | SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack | ||
Details | Website | 2023-03-23 | 1 | The Brass Tacks of AI and Cybersecurity | ||
Details | Website | 2023-03-23 | 1 | China-Aligned | ||
Details | Website | 2023-03-23 | 60 | New loader on the bloc - AresLoader | ||
Details | Website | 2023-03-23 | 3 | Russian hacktivists deploy new AresLoader malware via decoy installers | ||
Details | Website | 2023-03-23 | 21 | Operation Tainted Love | Chinese APTs Target Telcos in New Attacks | ||
Details | Website | 2023-03-22 | 19 | JSAC2023 -Day 2- - JPCERT/CC Eyes | ||
Details | Website | 2023-03-14 | 15 | CertVerify - A Scanner That Files With Compromised Or Untrusted Code Signing Certificates - RedPacket Security | ||
Details | Website | 2023-03-09 | 0 | New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery - Zimperium | ||
Details | Website | 2023-03-08 | 0 | Why software transparency is critical: Understanding supply chain security in a software-driven society | ||
Details | Website | 2023-03-06 | 3 | Your Guide to Secure Code Signing: Four Steps to Get Started | ||
Details | Website | 2023-03-01 | 138 | Hunting for Honkbox | Multistage macOS Cryptominer May Still Be Hiding | ||
Details | Website | 2023-02-28 | 19 | Investigating MacOS with Osquery |