Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-544:Counterfeit Organizations
Attack Pattern ID:544
Version:v3.9
Attack Pattern Name:Counterfeit Organizations
Abstraction:Detailed
Status:Draft
Likelihood of Attack:
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary creates a false front organizations with the appearance of a legitimate supplier in the critical life cycle path that then injects corrupted/malicious information system components into the organizational supply chain.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS194Fake the Source of Data
Nature: ChildOf
Type: Standard
ID: 194
Name: Fake the Source of Data
▼Execution Flow
▼Prerequisites
None
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Details not found