T1601 Modify System Image Mappings

Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file.

To change the operating system, the adversary typically only needs to affect this one file, replacing or modifying it. This can either be done live in memory during system runtime for immediate effect, or in storage to implement the change on the next boot of the network device.

View in MITRE ATT&CK®

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.malware.variety.Disable controls Disable or interfere with security controls related-to T1601 Modify System Image
attribute.integrity.variety.Software installation Software installation or code modification related-to T1601 Modify System Image

GCP Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
binary_authorization Binary Authorization technique_scores T1601 Modify System Image
Comments
Each image has a signer digitally sign using a private key. At deploy time, the enforcer uses the attester's public key to verify the signature in the attestation.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1601.001 Patch System Image 2
T1601.002 Downgrade System Image 1