CAPEC-473: Signature Spoof

Standard Draft

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker generates a message or datablock that causes the recipient to believe that the message or datablock was generated and cryptographically signed by an authoritative or reputable source, misleading a victim or victim operating system into performing malicious actions.

前提条件

  • The victim or victim system is dependent upon a cryptographic signature-based verification system for validation of one or more security events or actions.
  • The validation can be bypassed via an attacker-provided signature that makes it appear that the legitimate authoritative or reputable source provided the signature.

所需技能

High Technical understanding of how signature verification algorithms work with data and applications

后果影响

影响范围: Access Control Authentication

技术影响: Gain Privileges

示例实例

An attacker provides a victim with a malicious executable disguised as a legitimate executable from an established software by signing the executable with a forged cryptographic key. The victim's operating system attempts to verify the executable by checking the signature, the signature is considered valid, and the attackers' malicious executable runs.

An attacker exploits weaknesses in a cryptographic algorithm to that allow a private key for a legitimate software vendor to be reconstructed, attacker-created malicious software is cryptographically signed with the reconstructed key, and is installed by the victim operating system disguised as a legitimate software update from the software vendor.

分类映射

分类名称 条目ID 条目名称
ATTACK 1036.001 Masquerading: Invalid Code Signature
ATTACK 1553.002 Subvert Trust Controls: Code Signing
关键信息

CAPEC ID: CAPEC-473

抽象级别: Standard

状态: Draft

相关攻击模式