Open timb-machine opened 1 year ago
Defensive techniques
Execution, Persistence, Privilege Escalation, Defense Evasion
https://sandflysecurity.com/blog/detecting-linux-binary-file-poisoning/
attack:T1574:Hijack Execution Flow attack:T1204:User Execution attack:T1218:System Binary Proxy Execution attack:T1036.003:Rename System Utilities
No response
Linux, AIX, Solaris, HP-UX
Area
Defensive techniques
Parent threat
Execution, Persistence, Privilege Escalation, Defense Evasion
Finding
https://sandflysecurity.com/blog/detecting-linux-binary-file-poisoning/
Industry reference
attack:T1574:Hijack Execution Flow attack:T1204:User Execution attack:T1218:System Binary Proxy Execution attack:T1036.003:Rename System Utilities
Malware reference
No response
Actor reference
No response
Component
Linux, AIX, Solaris, HP-UX
Scenario
No response