Name |
Targeted Malware |
|
Likelyhood of attack |
Typical severity |
Low |
Low |
|
Summary |
An adversary develops targeted malware that takes advantage of a known vulnerability in an organizational information technology environment. The malware crafted for these attacks is based specifically on information gathered about the technology environment. Successfully executing the malware enables an adversary to achieve a wide variety of negative technical impacts. |
Prerequisites |
|
Solutions | |
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-549 |
An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others. |
CAPEC-662 |
An adversary exploits security vulnerabilities or inherent functionalities of a web browser, in order to manipulate traffic between two endpoints. |
|
Taxonomy: ATTACK |
Entry ID
|
Entry Name
|
1587.001 |
Develop Capabilities: Malware |
1027 |
Obfuscated Files or Information |
|