2. of Tampering (2022 deck) I
An attacker can modify your build system and produce signed builds of your software:
Threat |
|
Your credentials have been stolen and an attacker uses them to log in to the continuous integration/continuous delivery (CI/CD) platform. They modify the workflow so that it includes malware in the build artifact (JAR/executable/install files). |
|
CAPEC |
CAPEC-678: System Build Data Maliciously Altered CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation CAPEC-670: Software Development Tools Maliciously Altered CAPEC-446: Malicious Logic Insertion into Product via Inclusion of Third-Party Component CAPEC-511: Infiltration of Software Development Environment CAPEC-538: Open-Source Library Manipulation CAPEC-186: Malicious... |