CAPEC-673: Developer Signing Maliciously Altered Software

Detailed Draft 严重程度: High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

前提条件

  • An adversary would need to have access to a targeted developer’s software development environment, including to their software build processes, where the adversary could ensure code maliciously tainted prior to a build process is included in software packages built.

所需技能

High The adversary must have the skills to infiltrate a developer’s software development/build environment and to implant malicious code in developmental software code, a build server, or a software repository containing dependency code, which would be referenced to be included during the software build process.

后果影响

影响范围: Integrity Confidentiality

技术影响: Read Data

影响范围: Access Control Authorization

技术影响: Gain Privileges

缓解措施

Have a security concept of operations (CONOPS) for the IDE that includes: Protecting the IDE via logical isolation using firewall and DMZ technologies/architectures; Maintaining strict security administration and configuration management of configuration management tools, developmental software and dependency code repositories, compilers, and system build tools.

Employ intrusion detection and malware detection capabilities on IDE systems where feasible.

分类映射

分类名称 条目ID 条目名称
ATTACK 1195.002 Supply Chain Compromise: Compromise Software Supply Chain
关键信息

CAPEC ID: CAPEC-673

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: Medium

相关攻击模式