Malicious Software Download |
Attack Pattern ID: 185 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Very High | Status: Draft |
Malicious Software Download |
Attack Pattern ID: 185 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Very High | Status: Draft |
Summary
An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
CWE-ID | Weakness Name | Weakness Relationship Type |
---|---|---|
494 | Download of Code Without Integrity Check | Targeted |
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 184 | Software Integrity Attacks | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 186 | Malicious Software Update | Mechanism of Attack1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.