CAPEC 30 Hijacking a Privileged Thread of Execution

Draft Standard Low Risk
Severity Very High

Description

An adversary hijacks a privileged thread of execution by injecting malicious code into a running process. By using a privleged thread to do their bidding, adversaries can evade process-based detection that would stop an attack that creates a new process. This can lead to an adversary gaining access to the process's memory and can also enable elevated privileges. The most common way to perform this attack is by suspending an existing thread and manipulating its memory.

Attack Execution Flow

4

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1