Common Information
Type | Value |
---|---|
Value |
Code Repositories - T1213.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Once adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or credentials contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe) **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1593/003), which focuses on conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043) via public code repositories. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-15 | 3 | Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems - CyberSRC | ||
Details | Website | 2024-10-14 | 15 | Make Deployments Great Again: How to Use Helm with Continuous Deployment (CD) | ||
Details | Website | 2024-10-12 | 0 | Type of cyber Security Threats | ||
Details | Website | 2024-10-12 | 0 | Types of Cyber Security Threats | ||
Details | Website | 2024-10-09 | 3 | Hackers Hide Remcos RAT in GitHub Repository Comments | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-10-09 | 0 | Product Update: IP and Code Threat Detection Now Available for GitHub and Atlassian’s Suite of Products, Including Confluence and Jira | ||
Details | Website | 2024-10-09 | 6 | 5 commercial software attacks — and what you can learn from them | ||
Details | Website | 2024-10-09 | 6 | 5 commercial software attacks — and what you can learn from them | ||
Details | Website | 2024-10-07 | 0 | Simplify Password Security with WSO2 Asgardeo: Rule-Based Password Expiration & More 🚀 | ||
Details | Website | 2024-10-07 | 2 | Our Experience Building the Synk Integration | ||
Details | Website | 2024-10-04 | 20 | Getting started with Detection-as-Code and Sekoia Platform | ||
Details | Website | 2024-10-03 | 0 | The Secret Weakness Execs Are Overlooking: Non-Human Identities | ||
Details | Website | 2024-10-02 | 25 | Security Brief: Royal Mail Lures Deliver Open Source Prince Ransomware | Proofpoint US | ||
Details | Website | 2024-10-01 | 9 | Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning | ||
Details | Website | 2024-09-29 | 0 | NHI Use Case-1: Cross-Organization API Acess using API Keys | ||
Details | Website | 2024-09-27 | 44 | 30 Advanced Google Dork Queries for Uncovering Hidden Data and OSINT Insights | ||
Details | Website | 2024-09-24 | 3 | Winning the AIxCC Qualification Round | ||
Details | Website | 2024-09-24 | 0 | On the Security of Halo2 Proof System | ||
Details | Website | 2024-09-24 | 6 | Google & Arm - Raising The Bar on GPU Security | ||
Details | Website | 2024-09-23 | 0 | Microsoft’s Secure Future Initiative: A Bold Move to Reinforce Global Cybersecurity | ||
Details | Website | 2024-09-23 | 0 | Unlocking the Power of Large Language Models (LLMs) for Cybersecurity and Cloud Engineering | ||
Details | Website | 2024-09-23 | 1 | North Korean Threat Actors Exploit Python Packages to Deliver PondRAT Malware - CyberSRC | ||
Details | Website | 2024-09-23 | 0 | A FAIR perspective on generative AI risks and frameworks | ||
Details | Website | 2024-09-20 | 1 | GitLab Patches Critical SAML Authentication Bypass Vulnerability - CyberSRC | ||
Details | Website | 2024-09-19 | 2 | Why is Software Supply Chain Security a Must? |