CAPEC-442: Infected Software
ID
CAPEC-442
Typical Severity
High
Likelihood Of Attack
Medium
Status
Stable
An adversary adds malicious logic, often in the form of a computer virus, to otherwise benign software. This logic is often hidden from the user of the software and works behind the scenes to achieve negative impacts. Many times, the malicious logic is inserted into empty space between legitimate code, and is then called when the software is executed. This pattern of attack focuses on software already fielded and used in operation as opposed to software that is still under development and part of the supply chain.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-506 | Embedded Malicious Code | weakness |
Taxonomiy Mapping
Type | # ID | Name |
---|---|---|
ATTACK | 1195.001 | Supply Chain Compromise: Compromise Software Dependencies and Development Tools |
ATTACK | 1195.002 | Supply Chain Compromise: Compromise Software Supply Chain |