CAPEC 538 Open-Source Library Manipulation

Stable Detailed Low Risk
Severity High

Description

Adversaries implant malicious code in open source software (OSS) libraries to have it widely distributed, as OSS is commonly downloaded by developers and other users to incorporate into software development projects. The adversary can have a particular system in mind to target, or the implantation can be the first stage of follow-on attacks on many systems.

Attack Execution Flow

3

Consequences

Relationships

Related ATT&CK Techniques

1