Compromise Host Software Binary
Adversaries may modify host software binaries to establish persistent access to systems.
Description
Adversaries may modify host software binaries to establish persistent access to systems.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Code SigningRestrict File and Directory Permissions
Quick Info
- Technique ID
- T1554
- Tactic
- Persistence
- Mitigations
- 2
