| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | S | 444 | Development Alteration |
| CanPrecede | S | 669 | Alteration of a Software Update |
Ability to leverage common delivery mechanisms (e.g., email attachments, removable media) to infiltrate a development environment to gain access to software development tools for the purpose of malware insertion into an existing tool or replacement of an existing tool with a maliciously altered copy.
| Scope | Likelihood | Impact | Note |
|---|---|---|---|
| Integrity | N/A | Execute Unauthorized Commands | N/A |
| Access Control | N/A | Gain Privileges | N/A |
| Confidentiality | N/A | Modify DataRead Data | N/A |
| ID | Name |
|---|
| Taxonomy Name | Entry ID | Entry Name |
|---|---|---|
| ATTACK | 1127 | Trusted Developer Utilities Proxy Execution |
| ATTACK | 1195.001 | Supply Chain Compromise: Compromise Software Dependencies and Development Tools |