| ID | Name |
|---|---|
| T1195.001 | Compromise Software Dependencies and Development Tools |
| T1195.002 | Compromise Software Supply Chain |
| T1195.003 | Compromise Hardware Supply Chain |
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.
Targeting may be specific to a desired victim set or may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.[1][2]
| ID | Name | Description |
|---|---|---|
| C0057 | 3CX Supply Chain Attack |
During the 3CX Supply Chain Attack, AppleJeus first compromised an "end-of-life" trading software application which was downloaded and executed inside the 3CX enterprise environment. The second compromise modified the Windows and macOS build environments used to distribute the 3CX software to their customer base.[3] |
| G0096 | APT41 |
APT41 gained access to production environments where they could inject malicious code into legitimate, signed files and widely distribute them to end users.[4] |
| S0222 | CCBkdr |
CCBkdr was added to a legitimate, signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site.[5][6][1] |
| G0080 | Cobalt Group |
Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. [7] |
| G1034 | Daggerfly |
Daggerfly is associated with several supply chain compromises using malicious updates to compromise victims.[8][9] |
| G0035 | Dragonfly |
Dragonfly has placed trojanized installers for control system software on legitimate vendor app stores.[10][11] |
| G0046 | FIN7 |
FIN7 has gained initial access by compromising a victim's software supply chain.[12] |
| G0115 | GOLD SOUTHFIELD |
GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR.[13][14][15] |
| S0493 | GoldenSpy |
GoldenSpy has been packaged with a legitimate tax preparation software.[16] |
| G1036 | Moonstone Sleet |
Moonstone Sleet has distributed a trojanized version of PuTTY software for initial access to victims.[17] |
| G0034 | Sandworm Team |
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.[18][19][20] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software.[21][22][23][24] |
| S0562 | SUNSPOT |
SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.[25] |
| G0027 | Threat Group-3390 |
Threat Group-3390 has compromised the Able Desktop installer to gain access to victim's environments.[26] |
| ID | Mitigation | Description |
|---|---|---|
| M1051 | Update Software |
A patch management process should be implemented to check unused applications, unmaintained and/or previously vulnerable software, unnecessary features, components, files, and documentation. |
| M1016 | Vulnerability Scanning |
Continuous monitoring of vulnerability sources and the use of automatic and manual code review tools should also be implemented as well.[27] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0309 | Compromised software/update chain (installer/write → first-run/child → egress/signature anomaly) | AN0862 |
Adversary ships a tampered application or update: an updater/installer (msiexec/setup/update.exe/vendor service) writes or replaces binaries; on first run it spawns scripts/shells or unsigned DLLs and beacons to non-approved update CDNs/hosts. Detection correlates: (1) process creation of installer/updater → (2) file metadata changes in program paths → (3) first-run children and module/signature anomalies → (4) outbound connections to unexpected hosts within a short window. |
| AN0863 |
A compromised package/update (deb/rpm/tarball/AppImage/vendor updater) is installed, writing/overwriting files in /usr/local/bin, /usr/bin, /opt, or ~/.local; first run executes unexpected shells/curl/wget and connects to unapproved hosts. Correlate package/updater execution → file writes/replace → first-run child processes → egress. |
||
| AN0864 |
A tampered app/pkg/notarized update is installed via installer, softwareupdated, Homebrew, or vendor updater; new Mach-O or bundle contents appear in /Applications, /Library, /usr/local or /opt/homebrew; first run spawns sh/zsh/osascript/curl and makes egress to unfamiliar domains; AMFI/Gatekeeper may log signature/notarization problems. |