Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Subvert Trust Controls Defense Evasion Adversaries may undermine security controls that will either warn users of untrusted activity or pre… Edit
Subvert Trust Controls: Code Signing Defense Evasion Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Cod… Edit
Subvert Trust Controls: Code Signing Policy Modification Defense Evasion Adversaries may modify code signing policies to enable execution of unsigned or self-signed code. Co… Edit
Subvert Trust Controls: Gatekeeper Bypass Defense Evasion Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts an… Edit
Subvert Trust Controls: Install Root Certificate Defense Evasion Adversaries may install a root certificate on a compromised system to avoid warnings when connecting… Edit
Subvert Trust Controls: Mark-of-the-Web Bypass Defense Evasion Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, … Edit
Subvert Trust Controls: SIP and Trust Provider Hijacking Defense Evasion Adversaries may tamper with SIP and trust provider components to mislead the operating system and ap… Edit