Common Information
Type | Value |
---|---|
Value |
Code Signing Certificates - T1587.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is. Prior to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may develop self-signed code signing certificates for use in operations. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-03-09 | 38 | DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection | Deep Instinct | ||
Details | Website | 2023-03-06 | 3 | Your Guide to Secure Code Signing: Four Steps to Get Started | ||
Details | Website | 2023-03-06 | 0 | Journey Into Cybersecurity: What are Certificates? | ||
Details | Website | 2023-03-02 | 199 | Russia/Ukraine Update - February 2023 | ||
Details | Website | 2023-03-01 | 103 | BlackLotus UEFI bootkit: Myth confirmed | WeLiveSecurity | ||
Details | Website | 2023-02-24 | 0 | Checking your Mac for viruses. Wait, what? | ||
Details | Website | 2023-02-21 | 0 | Best Web Application Security Techniques 2023 | ||
Details | Website | 2023-02-16 | 1 | Emsisoft says hackers are spoofing its certs to breach networks - RedPacket Security | ||
Details | Website | 2023-02-06 | 0 | Tips for Boosting your Organisation’s Security Posture with Encryption | IT PRO | ||
Details | Website | 2023-01-30 | 2 | Action needed for GitHub Desktop and Atom users | The GitHub Blog | ||
Details | Website | 2023-01-13 | 1 | These hackers used Microsoft-signed malicious drivers to further their ransomware attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security | ||
Details | Website | 2023-01-13 | 2 | Ransomware Attackers Use Microsoft-Signed Drivers to Gain Access to Systems | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security | ||
Details | Website | 2022-12-26 | 0 | Comparison Analysis: Code Signing Vs. SSL Certificate | ||
Details | Website | 2022-12-24 | 0 | Cuba Ransomware Gang Abused Microsoft Certificates to Sign Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security | ||
Details | Website | 2022-12-20 | 133 | Russia/Ukraine Update - December 2022 | ||
Details | Website | 2022-12-14 | 2 | Ransomware Attackers Use Microsoft-Signed Drivers to Gain Access to Systems | ||
Details | Website | 2022-12-14 | 0 | Cuba ransomware group used Microsoft developer accounts to sign malicious drivers | ||
Details | Website | 2022-12-13 | 0 | Ransomware Gang Abused Microsoft Certificates to Sign Malware | ||
Details | Website | 2022-12-13 | 19 | Signed driver malware moves up the software trust chain | ||
Details | Website | 2022-12-13 | 15 | I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware | Mandiant | ||
Details | Website | 2022-12-02 | 10 | Leaked Android Platform Certificates Create Risks for Users | Rapid7 Blog | ||
Details | Website | 2022-11-29 | 132 | Russia/Ukraine Update - November 2022 | ||
Details | Website | 2022-11-24 | 0 | DUCKTAIL malware campaign targeting Facebook business and ads accounts is back | ||
Details | Website | 2022-11-21 | 2 | Who needs a Code Signing Certificate? | ||
Details | Website | 2022-11-17 | 5 | DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog |