An adversary with access to an organization’s software update infrastructure inserts malware into the content of an outgoing update to fielded systems where a wide range of malicious effects are possible. With the same level of access, the adversary can alter a software update to perform specific malicious acts including granting the adversary control over the software’s normal functionality.
Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 184 | Software Integrity Attack |
CanFollow | D | 670 | Software Development Tools Maliciously Altered |
CanPrecede | D | 673 | Developer Signing Maliciously Altered Software |
Identify software with frequent updates
The adversary must first identify a target software that has updates at least with some frequency, enough that there is am update infrastructure.
Technique |
---|
Gain access to udpate infrastructure
The adversary must then gain access to the organization's software update infrastructure. This can either be done by gaining remote access from outside the organization, or by having a malicious actor inside the organization gain access. It is often easier if someone within the organization gains access.
Technique |
---|
Alter the software update
Through access to the software update infrastructure, an adversary will alter the software update by injecting malware into the content of an outgoing update.
Technique |
---|
Skills required include the ability to infiltrate the organization’s software update infrastructure either from the Internet or from within the organization, including subcontractors, and be able to change software being delivered to customer/user systems in an undetected manner.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Access Control | N/A | Gain Privileges | N/A |
Authorization | N/A | Execute Unauthorized Commands | N/A |
Integrity | N/A | Modify Data | N/A |
Confidentiality | N/A | Read Data | N/A |
ID | Name |
---|
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1195.002 | Supply Chain Compromise: Compromise Software Supply Chain |