Common Information
Type | Value |
---|---|
Value |
Code Signing Certificates - T1587.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is. Prior to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may develop self-signed code signing certificates for use in operations. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-03-25 | 4 | Purple Fox Uses New Arrival Vector and Improves Malware Arsenal | ||
Details | Website | 2022-03-25 | 4 | Purple Fox Uses New Arrival Vector and Improves Malware Arsenal | ||
Details | Website | 2022-03-21 | 5 | A Behind the Scenes Look into Investigating Conti Leaks | Analyst1 | ||
Details | Website | 2022-03-01 | 65 | IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine | WeLiveSecurity | ||
Details | Website | 2022-02-23 | 314 | (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware | Mandiant | ||
Details | Website | 2021-12-24 | 3 | New BLISTER Malware Using Code Signing Certificates to Evade Detection | ||
Details | Website | 2021-12-22 | 30 | BLISTER malware campaign discovered | ||
Details | Website | 2021-10-12 | 62 | Going Coast to Coast - Climbing the Pyramid with the Deimos Implant | ||
Details | Website | 2021-08-10 | 105 | UNC215: Spotlight on a Chinese Espionage Campaign in Israel | Mandiant | ||
Details | Website | 2021-08-03 | 75 | APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere | ||
Details | Website | 2021-06-16 | 87 | Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise | Mandiant | ||
Details | Website | 2021-05-18 | 53 | W3 May | EN | Story of the week: Code Signing Certificate on the Darkweb | ||
Details | Website | 2021-02-25 | 190 | So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant | ||
Details | Website | 2021-02-03 | 4 | EDR and Blending In: How Attackers Avoid Getting Caught | ||
Details | Website | 2021-01-14 | 663 | Higaisa or Winnti? APT41 backdoors, old and new | ||
Details | Website | 2020-12-15 | 74 | QakBot reducing its on disk artifacts - Hornetsecurity | ||
Details | Website | 2020-11-16 | 98 | Lazarus supply‑chain attack in South Korea | WeLiveSecurity | ||
Details | Website | 2020-10-14 | 2 | FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft | Mandiant | ||
Details | Website | 2020-10-12 | 17 | "Front Door" into BazarBackdoor: Stealthy Cybercrime Weapon | ||
Details | Website | 2020-07-20 | 2 | What even is Winnti? - Risky Business | ||
Details | Website | 2020-01-08 | 12 | From Mega to Giga: Cross-Version Comparison of Top MegaCortex Modifications | ||
Details | Website | 2019-12-12 | 30 | GALLIUM: Targeting global telecom | ||
Details | Website | 2019-03-22 | 276 | UNKNOWN | ||
Details | Website | 2019-03-04 | 7 | APT40 | Examining a China-Nexus Espionage Actor | Mandiant | ||
Details | Website | 2018-08-01 | 735 | On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation | Mandiant |