Critical Infrastructure Cybersecurity Framework
T1554Persistence2 Mitigations

Compromise Host Software Binary

Adversaries may modify host software binaries to establish persistent access to systems.

Description

Adversaries may modify host software binaries to establish persistent access to systems.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Code SigningRestrict File and Directory Permissions

Quick Info

Technique ID
T1554
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.