<noframes id="vfxvr">

    <track id="vfxvr"></track>

      <span id="vfxvr"></span>

          ATT&CK-CN V1.01 Last Update: 2019-11 [返回索引頁]

          譯者: 林妙倩(清華大學網絡研究院網絡空間安全實習生)、戴亦侖(賽寧網安) 原創翻譯作品,如果需要轉載請取得翻譯作者同意。

          數據來源:ATT&CK Matrices

          原文: https://attack.mitre.org/techniques/T1494

          術語表: /attack/glossary

          運行時數據處理

          攻擊者可能會修改系統,以便在數據被訪問并顯示給最終用戶時對其進行處理。通過操縱運行時數據,對手可能會嘗試影響業務流程,組織理解和決策。

          對手可能會更改用于顯示數據的應用程序二進制文件,以引起運行時操縱。對手也可能會進行“ 更改默認文件關聯”和“ 偽裝”,以產生類似的效果。修改的類型及其影響取決于目標應用程序和過程以及對手的目標和目的。對于復雜的系統,對手可能需要特殊的專業知識,并且可能需要訪問與該系統相關的專用軟件,這通常是通過長時間的信息收集活動來獲得的,以產生所需的影響。

          Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user. By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making.

          Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct Change Default File Association and Masquerading to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.

          標簽

          ID編號: T1494

          策略: 影響

          平臺: Linux,macOS,Windows

          所需權限:user,administrator,root,SYSTEM

          數據源: 文件監視,過程監視

          影響類型: 完整性

          程序示例

          名稱 描述
          APT38 (G0082) APT38在訪問PDF數據時使用DYEPACK.FOX來處理它,以從顯示給最終用戶的數據中刪除欺詐性SWIFT交易的痕跡。
          Name Description
          APT38(G0082) APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user. [1]

          緩解措施

          緩解 描述
          網絡細分(M1030) 確定對手可能針對的關鍵業務和系統流程,并努力隔離和保護這些系統,防止未經授權的訪問和篡改。
          限制文件和目錄權限(M1022) 防止替換,覆蓋或重新配置關鍵的業務和系統流程以加載潛在的惡意代碼。
          Mitigation Description
          Network Segmentation(M1030) Identify critical business and system processes that may be targeted by adversaries and work to isolate and secure those systems against unauthorized access and tampering.
          Restrict File and Directory Permissions(M1022) Prevent critical business and system processes from being replaced, overwritten, or reconfigured to load potentially malicious code.

          檢測

          檢查重要的應用程序二進制文件哈希,位置和修改是否可疑/意外值。

          Inspect important application binary file hashes, locations, and modifications for suspicious/unexpected values.

          欧美日韩国产亚洲,天天射影院,大芭蕉天天视频在线观看,欧美肥老太牲交大片,奇米色888,黄三级高清在线播放,国产卡一卡二卡三卡四,亚洲第一黄色视频 日韩中文字幕中文有码,日本A级作爱片一,奇米第四,三级片短片视频免费在线观看,奇米网狠狠网,影音先锋色AV男人资源网,日本丰满熟妇hd 日本日韩中文字幕无区码,涩 色 爱 性,天天射影视,中文字幕制服丝袜第57页,777米奇影院奇米网狠狠,尤物TV国产精品看片在线,欧洲女同牲恋牲交视频 久久AV天堂日日综合,亚洲性爱影院色yeye,日韩亚洲欧美Av精品,十八禁全身裸露全彩漫画,奇米网影视,人人爽人人澡人人人妻,动漫AV专区,天天色综合影院 日韩精品中文字幕,特级无码毛片免费视频,人妻少妇不卡无码视频,制服丝袜有码中文字幕在线,深爱激动情网婷婷,影音先锋全部色先锋,香港三级日本三级韩级人妇 日韩欧美亚洲综合久久在线视频,2021XX性影院,玖玖资源站最稳定网址,日韩亚洲制服丝袜中文字幕,国产超碰人人模人人爽人人喊,先锋色熟女丝袜资源 很黄特别刺激又免费的视频,2021一本久道在线线观看,色中娱乐黄色大片,日本高清不卡在线观看播放,97国产自在现线免费视频,国产在线精品亚洲第一区 免费中文字幕精品一区二区 视频,狠狠爱俺也色,天天好逼网,日韩制服丝袜,国产女人大象蕉视频在线观看,国产 精品 自在 线免费,午夜时刻在线观看