Home > CAPEC List > CAPEC-533: Malicious Manual Software Update (Version 2.11)  

CAPEC-533: Malicious Manual Software Update

Malicious Manual Software Update
Definition in a New Window Definition in a New Window
Attack Pattern ID: 533
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker introduces malicious code to the victim's system by altering the payload of a software update, allowing for additional compromise or site disruption at the victim location. These manual, or user-assisted attacks, vary from requiring the user to download and run an executable, to as streamlined as tricking the user to click a URL. Attacks which aim at penetrating a specific network infrastructure often rely upon secondary attack methods to achieve the desired impact. Spamming, for example, is a common method employed as an secondary attack vector. Thus the attacker has in his or her arsenal a choice of initial attack vectors ranging from traditional SMTP/POP/IMAP spamming and its varieties, to web-application mechanisms which commonly implement both chat and rich HTML messaging within the user interface.

+ Attack Prerequisites
  • Advanced knowledge about the download and update installation processes.

  • Advanced knowledge about the deployed system and its various software subcomponents and processes.

+ Typical Severity


+ Typical Likelihood of Exploit

Likelihood: Low

The nature of these type of attacks involve a coordinated effort between well-funded multiple attackers, and sometimes require physical access to successfully complete an attack. As a result these types of attacks are not launched on a large scale against any potential victim, but are typically highly targeted against victims who are often targeted and may have rather sophisticated cyber defenses already in place.

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: High

Able to develop malicious code that can be used on the victim's system while maintaining normal functionality.

+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Examples-Instances, References, Related_Attack_Patterns, Typical_Likelihood_of_ExploitInternal
Previous Entry Names
DatePrevious Entry Name
2015-11-09Malicious Software Update

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017