Common Information
Type Value
Value
Code Signing - T1553.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning) Code signing certificates may be used to bypass security policies that require signed code to execute on a system.
Details Published Attributes CTI Title
Details Website 2011-10-20 4 Does Anyone Want the Source Code to Stuxnet? Come and Get It!!! (update 1)
Details Website 2011-08-23 0 Hasta La Vista, Bootkit: Exploiting the VBR | WeLiveSecurity
Details Website 2011-05-27 14 Recent Developments in Java Signed Applets | Rapid7 Blog
Details Website 2011-01-15 2 A Different Approach to ICS Security Controls and Stuxnet Mitigation Strategies
Details Website 2010-11-17 0 TDL AKA Alureon Rootkit Now Infecting 64-Bit Windows 7 Platform - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2010-09-23 10 BruCON 2010 : Day 0x1 | Corelan Cybersecurity Research
Details Website 2010-07-15 2 Myrtus and Guava, Episode 2
Details Website 2006-08-11 0 Windows Vista x64 Security – Pt 2 – Patchguard - Microsoft Security Blog