Common Information
Type Value
Value
Supply Chain Compromise - T1195
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Supply chain compromise is the manipulation of products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. (Citation: Avast CCleaner3 2018) (Citation: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) Targeting may be specific to a desired victim set (Citation: Symantec Elderwood Sept 2012) or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. (Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Detection: Use verification of distributed binaries through hash checking or other integrity checking mechanisms. Scan downloads for malicious signatures and attempt to test software and updates prior to deployment while taking note of potential suspicious activity. Perform physical inspection of hardware to look for potential tampering. Platforms: Linux, Windows, macOS Data Sources: Web proxy, File monitoring
Details Published Attributes CTI Title
Details Website 2024-11-07 9 Category
Details Website 2024-11-06 0 Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-05 0 Food and Ag-ISAC publishes cyber threat report, broadens scope beyond ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-01 3 Lateral Movement in Recent Cybersecurity Breaches | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-31 3 Lateral Movement in Recent Cybersecurity Breaches
Details Website 2024-10-31 9 Satori Threat Intelligence Alert: Phish ’n’ Ships Fakes Online Shops to Steal Money and Credit Card Information
Details Website 2024-10-31 0 LottieFiles hit in npm supply chain attack targeting users' crypto
Details Website 2024-10-31 1 LottieFiles hacked in supply chain attack to steal users’ crypto
Details Website 2024-10-30 0 5 Reasons Why Risk-Based Vulnerability Management Matters in OT | Dragos
Details Website 2024-10-25 0 Cybersecurity Threats in 2024: What Every Business Should Watch For
Details Website 2024-10-21 6 Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain
Details Website 2024-10-21 6 Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain - RedPacket Security
Details Website 2024-10-21 6 Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-21 0 Seven Cybersecurity Tips to Protect Your Retail Business This Holiday Season | Imperva
Details Website 2024-10-21 18 The Silent Game: Sophisticated Threat Actors Targeting Gambling Industry
Details Website 2024-10-17 0 The Shifting Landscape of OT Incident Response | Dragos
Details Website 2024-10-15 3 Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems - CyberSRC
Details Website 2024-10-11 1 Biggest Manufacturing Industry Attacks 2024 - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-11 1 Biggest Manufacturing Industry Attacks 2024
Details Website 2024-10-10 27 Russian SVR Exploiting Unpatched Vulnerabilities in Global Cyber Campaign
Details Website 2024-10-09 6 malware Investigation: A Cross-Platform Approach
Details Website 2024-10-01 11 VirusTotal 101: A Beginner’s Guide to File Analysis and Threat Detection
Details Website 2024-09-24 3 SaaS Data Breaches on the Rise
Details Website 2024-09-23 0 Supply Chain Attacks, Cybersecurity Threats, and Legal Battles Highlight Growing Global Security…
Details Website 2024-09-23 0 North Korean Hackers Poison Python Packages: A New Threat for Software Developers