Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
658 threats — page 14 of 14
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Obtain Capabilities: Vulnerabilities | Resource Development | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulne… | Edit | |
| Stage Capabilities | Resource Development | Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting.… | Edit | |
| Stage Capabilities: Drive-by Target | Resource Development | Adversaries may prepare an operational environment to infect systems that visit a website over the n… | Edit | |
| Stage Capabilities: Install Digital Certificate | Resource Development | Adversaries may install SSL/TLS certificates that can be used during targeting. SSL/TLS certificates… | Edit | |
| Stage Capabilities: Link Target | Resource Development | Adversaries may put in place resources that are referenced by a link that can be used during targeti… | Edit | |
| Stage Capabilities: SEO Poisoning | Resource Development | Adversaries may poison mechanisms that influence search engine optimization (SEO) to further lure st… | Edit | |
| Stage Capabilities: Upload Malware | Resource Development | Adversaries may upload malware to third-party or adversary controlled infrastructure to make it acce… | Edit | |
| Stage Capabilities: Upload Tool | Resource Development | Adversaries may upload tools to third-party or adversary controlled infrastructure to make it access… | Edit |