CAPEC-552: Install Rootkit

Detailed Draft 严重程度: High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.

缓解措施

Prevent adversary access to privileged accounts necessary to install rootkits.

示例实例

A rootkit may take the form of a hypervisor. A hypervisor is a software layer that sits between the operating system and the processor. It presents a virtual running environment to the operating system. An example of a common hypervisor is Xen. Because a hypervisor operates at a level below the operating system it can hide its existence from the operating system.

Similar to a rootkit, a bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Volume Boot Record (VBR). Adversaries may use bootkits to persist on systems at a layer below the operating system, which may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.

分类映射

分类名称 条目ID 条目名称
ATTACK 1014 Rootkit
ATTACK 1542.003 Pre-OS Boot:Bootkit
ATTACK 1547.006 Boot or Logon Autostart Execution:Kernel Modules and Extensions
关键信息

CAPEC ID: CAPEC-552

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: Medium

相关攻击模式
相关CWE弱点