Common Information
Type Value
Value
Code Signing - T1553.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning) Code signing certificates may be used to bypass security policies that require signed code to execute on a system.
Details Published Attributes CTI Title
Details Website 2018-05-18 8 RSA NetWitness Endpoint Content - Dashboards, Meta Groups, ESA Rules
Details Website 2018-05-18 8 RSA NetWitness Endpoint Insights - Scan Data Reports (Now in RSA Live!)
Details Website 2018-05-15 12 Most Important Security Tools and Resources For Security Researcher, Malware Analyst, Reverse Engineer
Details Website 2018-05-03 10 Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
Details Website 2018-04-12 7 Windows IIS 6.0 CVE-2017-7269 is Targeted Again to Mine Electroneum | F5 Labs
Details Website 2018-04-05 2 Understanding Code Signing Abuse in Malware Campaigns
Details Website 2018-03-02 70 McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups | McAfee Blog
Details Website 2018-02-22 1 The Use of Counterfeit Code Signing Certificates Is on the Rise
Details Website 2018-02-21 0 Rambus talks IoT security with Semiconductor Engineering
Details Website 2018-02-20 2 Security Alert: Attackers Using Script Injection to Spread Bitcoin-Mining Malware
Details Website 2017-12-07 4 The Jailbreaking Community Is Bracing for Google to Publicly Drop an iPhone Exploit
Details Website 2017-11-14 3 APT Trends report Q3 2017 | Securelist
Details Website 2017-10-20 0 Wi-Fi is hacked and so are your IoT devices?
Details Website 2017-10-10 10 Tracking a stolen code-signing certificate with osquery
Details Website 2017-08-30 31 Introducing WhiteBear
Details Website 2017-08-23 16 Bypassing VirtualBox Process Hardening on Windows
Details Website 2017-08-08 21 WTF is Mughthesec!? Poking on a Piece of Undetected Adware
Details Website 2017-07-24 24 Real News, Fake Flash: Mac OS X Users Targeted | Volexity
Details Website 2017-07-19 0 Break your own product, and break it hard - F-Secure Blog
Details Website 2017-07-12 0 Could ‘Right to Repair’ heighten the risk for IoT and smart devices? | Pen Test Partners
Details Website 2017-06-29 26 NotPetya Ransomware Attack [Technical Analysis]
Details Website 2017-06-02 12 Threat actors leverage EternalBlue exploit to deliver non-WannaCry payloads | Mandiant
Details Website 2017-05-01 6 Another OSX.Dok dropper found installing new backdoor | Malwarebytes Labs
Details Website 2017-04-03 6 Defeating Device Guard: A look into CVE-2017-0007
Details Website 2017-03-24 4 Deconstructing Code Signing: how to get the certificate, sign a code and verify signatures? | CQURE Academy