An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Description
Mitigations
4
Consequences
Relationships
Related ATT&CK Techniques
1