CAPEC-524: Rogue Integration Procedures

Standard Draft 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker alters or establishes rogue processes in an integration facility in order to insert maliciously altered components into the system. The attacker would then supply the malicious components. This would allow for malicious disruption or additional compromise when the system is deployed.

前提条件

  • Physical access to an integration facility that prepares the system before it is deployed at the victim location.

所需技能

High Advanced knowledge of the design of the system.
High Hardware creation and manufacture of replacement components.

缓解措施

Deploy strong code integrity policies to allow only authorized apps to run.

Use endpoint detection and response solutions that can automaticalkly detect and remediate suspicious activities.

Maintain a highly secure build and update infrastructure by immediately applying security patches for OS and software, implementing mandatory integrity controls to ensure only trusted tools run, and requiring multi-factor authentication for admins.

Require SSL for update channels and implement certificate transparency based verification.

Sign everything, including configuration files, XML files and packages.

Develop an incident response process, disclose supply chain incidents and notify customers with accurate and timely information.

Maintain strong physical system access controls and monitor networks and physical facilities for insider threats.

示例实例

An attacker gains access to a system integrator's documentation for the preparation of purchased systems designated for deployment at the victim's location. As a part of the preparation, the included 100 megabit network card is to be replaced with a 1 gigabit network card. The documentation is altered to reflect the type of 1 gigabit network card to use, and the attacker ensures that this type of network card is provided by the attacker's own supply. The card has additional malicious functionality which will allow for additional compromise by the attacker at the victim location once the system is deployed.

关键信息

CAPEC ID: CAPEC-524

抽象级别: Standard

状态: Draft

典型严重程度: High

攻击可能性: Low

相关攻击模式