T1554 Compromise Client Software Binary Mappings

Adversaries may modify client software binaries to establish persistent access to systems. Client software enables users to access services provided by a server. Common client software types are SSH clients, FTP clients, email clients, and web browsers.

Adversaries may make modifications to client software binaries to carry out malicious tasks when those applications are in use. For example, an adversary may copy source code for the client software, add a backdoor, compile for the target, and replace the legitimate application binary (or support files) with the backdoored one. Since these applications may be routinely executed by the user, the adversary can leverage this for persistent access to the host.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
CA-8 Penetration Testing Protects T1554 Compromise Client Software Binary
CM-2 Baseline Configuration Protects T1554 Compromise Client Software Binary
CM-6 Configuration Settings Protects T1554 Compromise Client Software Binary
IA-9 Service Identification and Authentication Protects T1554 Compromise Client Software Binary
SI-7 Software, Firmware, and Information Integrity Protects T1554 Compromise Client Software Binary
SR-11 Component Authenticity Protects T1554 Compromise Client Software Binary
SR-4 Provenance Protects T1554 Compromise Client Software Binary
SR-5 Acquisition Strategies, Tools, and Methods Protects T1554 Compromise Client Software Binary
SR-6 Supplier Assessments and Reviews Protects T1554 Compromise Client Software Binary
CVE-2012-0158 n/a uncategorized T1554 Compromise Client Software Binary
action.hacking.vector.Backdoor or C2 Backdoor or command and control channel related-to T1554 Compromise Client Software Binary
action.malware.variety.Adminware System or network utilities (e.g., PsTools, Netcat) related-to T1554 Compromise Client Software Binary
action.malware.variety.Backdoor Backdoor (enable remote access). Child of 'RAT' when combined with 'Trojan' related-to T1554 Compromise Client Software Binary
action.malware.variety.Trojan An application which appears legitimate but hides malicious functionality. Child of 'RAT' when combined with 'Backdoor' related-to T1554 Compromise Client Software Binary