CAPEC 558 Replace Trusted Executable

Stable Detailed Low Risk
Severity High

Description

An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.

Consequences

Relationships

Related ATT&CK Techniques

2