CAPEC 552 Install Rootkit

Draft Detailed Medium Risk
Severity High

Description

An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

3