An adversary tampers with a DLL and embeds a computer virus into gaps between legitimate machine instructions. These gaps may be the result of compiler optimizations that pad memory blocks for performance gains. The embedded virus then attempts to infect any machine which interfaces with the product, and possibly steal private data or eavesdrop.
Access to the software currently deployed at a victim location. This access is often obtained by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
Scope
Likelihood
Impact
Note
Authorization
N/A
Execute Unauthorized Commands
N/A
Scope: Authorization
Likelihood: N/A
Impact: Execute Unauthorized Commands
Note: N/A
▼Mitigations
Leverage anti-virus products to detect and quarantine software with known virus.