Common Information
Type | Value |
---|---|
Value |
Code Signing - T1553.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-09-26 | 2 | Free Code Signing Certificate – Where to Find One? | ||
Details | Website | 2022-09-23 | 950 | Microsoft recommended driver block rules (Windows) - Windows security | ||
Details | Website | 2022-09-21 | 1 | Identifying file manipulation in system files | ||
Details | Website | 2022-09-21 | 81 | Iranian State Actors Conduct Cyber Operations Against the Government of Albania | CISA | ||
Details | Website | 2022-09-15 | 41 | Erbium Stealer, a new Infostealer enters the scene | ||
Details | Website | 2022-09-13 | 1 | What is Ransomware Detection? How to Detect Ransomware - SOC Prime | ||
Details | Website | 2022-09-09 | 2 | How Do Ransomware Attacks Work? | ||
Details | Website | 2022-09-07 | 7 | FAQ - Let's Encrypt | ||
Details | Website | 2022-08-29 | 2 | How Cybersecurity Policy Has Changed Since the SolarWinds Attack | ||
Details | Website | 2022-08-29 | 0 | Continuity Central | ||
Details | Website | 2022-08-29 | 11 | Ankura CTIX FLASH Update - August 26, 2022 - Security - United States | ||
Details | Website | 2022-08-29 | 20 | Part 1 – SingPass RASP Analysis | Romain Thomas | ||
Details | Website | 2022-08-27 | 1 | 77% of security leaders fear we’re in perpetual cyberwar | ||
Details | Website | 2022-08-24 | 11 | Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus | ||
Details | Website | 2022-08-24 | 13 | Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus | ||
Details | Website | 2022-08-23 | 3 | North Korea Cyber Threat Group ‘Lazarus’ Targets M1 Mac with Signed Executables | ||
Details | Website | 2022-08-19 | 183 | State of the Remote Access Tools, Part 1 | ||
Details | Website | 2022-08-10 | 138 | Cisco Talos shares insights related to recent cyber attack on Cisco | ||
Details | Website | 2022-08-03 | 53 | Elastic Security uncovers BLISTER malware campaign — Elastic Security Labs | ||
Details | Website | 2022-07-27 | 14 | Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits | Microsoft Security Blog | ||
Details | Website | 2022-07-26 | 60 | Mandiant Red Team Emulates FIN11 Tactics To Control Operational Technology Servers | Mandiant | ||
Details | Website | 2022-07-25 | 16 | How to Inject Code into Mach-O Apps. Part II. | ||
Details | Website | 2022-07-16 | 9 | Rootkit - Wikipedia | ||
Details | Website | 2022-06-23 | 38 | Spyware vendor targets users in Italy and Kazakhstan | ||
Details | Website | 2022-06-11 | 146 | Exposing HelloXD Ransomware and x4k |