Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-448:Embed Virus into DLL
Attack Pattern ID:448
Version:v3.9
Attack Pattern Name:Embed Virus into DLL
Abstraction:Detailed
Status:Stable
Likelihood of Attack:Medium
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary tampers with a DLL and embeds a computer virus into gaps between legitimate machine instructions. These gaps may be the result of compiler optimizations that pad memory blocks for performance gains. The embedded virus then attempts to infect any machine which interfaces with the product, and possibly steal private data or eavesdrop.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS442Infected Software
Nature: ChildOf
Type: Standard
ID: 442
Name: Infected Software
▼Execution Flow
▼Prerequisites
Access to the software currently deployed at a victim location. This access is often obtained by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
AuthorizationN/AExecute Unauthorized CommandsN/A
Scope: Authorization
Likelihood: N/A
Impact: Execute Unauthorized Commands
Note: N/A
▼Mitigations
Leverage anti-virus products to detect and quarantine software with known virus.
▼Example Instances
▼Related Weaknesses
IDName
CWE-506Embedded Malicious Code
ID: CWE-506
Name: Embedded Malicious Code
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1027.009Obfuscated Files or Information: Embedded Payloads
Taxonomy Name: ATTACK
Entry ID: 1027.009
Entry Name: Obfuscated Files or Information: Embedded Payloads
▼Notes
▼References
Details not found