{'xhtml:p': 'An adversary exploits security vulnerabilities or inherent functionalities of a web browser, in order to manipulate traffic between two endpoints.'}
Description
Attack Execution Flow
Step 1
ExperimentThe adversary tricks the victim into installing the Trojan Horse malware onto their system.
Conduct phishing attacks, drive-by malware installations, or masquerade malicious browser extensions as being legitimate.
L'attore malevolo inganna la vittima inducendola a installare il malware Trojan Horse sul proprio sistema.
Esegue attacchi di phishing, installazioni di malware drive-by o maschera estensioni browser dannose come legittime.
Attack Techniques
-
Conduct phishing attacks, drive-by malware installations, or masquerade malicious browser extensions as being legitimate.
Step 2
ExperimentThe adversary inserts themself into the communication channel initially acting as a routing proxy between the two targeted components.
L'avversario si inserisce nel canale di comunicazione inizialmente agendo come proxy di routing tra i due componenti mirati.
Step 3
ExploitThe adversary observes, filters, or alters passed data of their choosing to gain access to sensitive information or to manipulate the actions of the two target components for their own purposes.
L'avversario osserva, filtra o altera i dati trasmessi a suo piacimento per ottenere accesso a informazioni sensibili o per manipolare le azioni dei due componenti target a proprio vantaggio.