Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 444 | Development Alteration |
The adversary will make the selection based on various criteria:
Technique |
---|
The adversary develops a plan to contribute malicious code, taking the following into consideration:
Technique |
---|
Execute the plan for malicious contribution
Write the code to be contributed based on the plan and then submit the contribution. Multiple commits, possibly using multiple identities, will help obscure the attack. Monitor the contribution site to try to determine if the code has been uploaded to the target system.
Technique |
---|
Advanced knowledge about the inclusion and specific usage of an open source code project within system being targeted for infiltration.
Scope | Likelihood | Impact | Note |
---|
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1195.001 | Supply Chain Compromise: Software Dependencies and Development Tools |