Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 444 | Development Alteration |
CanPrecede | S | 669 | Alteration of a Software Update |
Ability to leverage common delivery mechanisms (e.g., email attachments, removable media) to infiltrate a development environment to gain access to software development tools for the purpose of malware insertion into an existing tool or replacement of an existing tool with a maliciously altered copy.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Integrity | N/A | Execute Unauthorized Commands | N/A |
Access Control | N/A | Gain Privileges | N/A |
Confidentiality | N/A | Modify DataRead Data | N/A |
ID | Name |
---|
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1127 | Trusted Developer Utilities Proxy Execution |
ATTACK | 1195.001 | Supply Chain Compromise: Compromise Software Dependencies and Development Tools |