An adversary manipulates the files in a shared location by adding malicious programs, scripts, or exploit code to valid content. Once a user opens the shared content, the tainted content is executed.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1