Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
7 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Subvert Trust Controls | Defense Evasion | Adversaries may undermine security controls that will either warn users of untrusted activity or pre… | Edit | |
| Subvert Trust Controls: Code Signing | Defense Evasion | Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Cod… | Edit | |
| Subvert Trust Controls: Code Signing Policy Modification | Defense Evasion | Adversaries may modify code signing policies to enable execution of unsigned or self-signed code. Co… | Edit | |
| Subvert Trust Controls: Gatekeeper Bypass | Defense Evasion | Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts an… | Edit | |
| Subvert Trust Controls: Install Root Certificate | Defense Evasion | Adversaries may install a root certificate on a compromised system to avoid warnings when connecting… | Edit | |
| Subvert Trust Controls: Mark-of-the-Web Bypass | Defense Evasion | Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, … | Edit | |
| Subvert Trust Controls: SIP and Trust Provider Hijacking | Defense Evasion | Adversaries may tamper with SIP and trust provider components to mislead the operating system and ap… | Edit |