Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
19 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Event Triggered Execution: Python Startup Hooks | Persistence | Adversaries may achieve persistence by leveraging Python’s startup mechanisms, including path config… | Edit | |
| Event Triggered Execution: Udev Rules | Persistence | Adversaries may maintain persistence through executing malicious content triggered using udev rules.… | Edit | |
| Event Triggered Execution | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger… | Edit | |
| Event Triggered Execution: Accessibility Features | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges by executing malicious content trigg… | Edit | |
| Event Triggered Execution: AppCert DLLs | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges by executing malicious content trigg… | Edit | |
| Event Triggered Execution: AppInit DLLs | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges by executing malicious content trigg… | Edit | |
| Event Triggered Execution: Application Shimming | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges by executing malicious content trigg… | Edit | |
| Event Triggered Execution: Change Default File Association | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by a file type associ… | Edit | |
| Event Triggered Execution: Component Object Model Hijacking | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by hijacked reference… | Edit | |
| Event Triggered Execution: Emond | Privilege Escalation | Adversaries may gain persistence and elevate privileges by executing malicious content triggered by … | Edit | |
| Event Triggered Execution: Image File Execution Options Injection | Privilege Escalation | Adversaries may establish persistence and/or elevate privileges by executing malicious content trigg… | Edit | |
| Event Triggered Execution: Installer Packages | Privilege Escalation | Adversaries may establish persistence and elevate privileges by using an installer to trigger the ex… | Edit | |
| Event Triggered Execution: LC_LOAD_DYLIB Addition | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by the execution of t… | Edit | |
| Event Triggered Execution: Netsh Helper DLL | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs.… | Edit | |
| Event Triggered Execution: PowerShell Profile | Privilege Escalation | Adversaries may gain persistence and elevate privileges by executing malicious content triggered by … | Edit | |
| Event Triggered Execution: Screensaver | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by user inactivity. S… | Edit | |
| Event Triggered Execution: Trap | Privilege Escalation | Adversaries may establish persistence by executing malicious content triggered by an interrupt signa… | Edit | |
| Event Triggered Execution: Unix Shell Configuration Modification | Privilege Escalation | Adversaries may establish persistence through executing malicious commands triggered by a user’s she… | Edit | |
| Event Triggered Execution: Windows Management Instrumentation Event Subscription | Privilege Escalation | Adversaries may establish persistence and elevate privileges by executing malicious content triggere… | Edit |