Resource Development

T1588.003: Code Signing Certificates

Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author an...

T1588.003 · Sub-technique ·1 platforms ·7 groups

Description

Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a program from the developer and a guarantee that the program has not been tampered with.(Citation: Wikipedia Code Signing) Users and/or security tools may trust a signed piece of code more than an unsigned piece of code even if they don't know who issued the certificate or who the author is.

Prior to Code Signing, adversaries may purchase or steal code signing certificates for use in operations. The purchase of code signing certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal code signing materials directly from a compromised third-party.

Platforms

PRE

Mitigations (1)

Pre-compromiseM1056

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.

Threat Groups (7)

IDGroupContext
G0102Wizard Spider[Wizard Spider](https://attack.mitre.org/groups/G0102) has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware p...
G0049OilRig[OilRig](https://attack.mitre.org/groups/G0049) has obtained stolen code signing certificates to digitally sign malware.(Citation: ClearSky OilRig Jan...
G0098BlackTech[BlackTech](https://attack.mitre.org/groups/G0098) has used stolen code-signing certificates for its malicious payloads.(Citation: Symantec Palmerworm...
G0061FIN8[FIN8](https://attack.mitre.org/groups/G0061) has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to a...
G0129Mustang Panda[Mustang Panda](https://attack.mitre.org/groups/G0129) has used revoked code signing certificates for its malicious payloads.(Citation: Zscaler PAKLOG...
G0027Threat Group-3390[Threat Group-3390](https://attack.mitre.org/groups/G0027) has obtained stolen valid certificates, including from VMProtect and the Chinese instant me...
G0094Kimsuky[Kimsuky](https://attack.mitre.org/groups/G0094) has stolen a valid certificate that is used to sign the malware and the dropper.(Citation: S2W Troll ...

Associated Software (1)

IDNameTypeContext
S0576MegaCortexMalware[MegaCortex](https://attack.mitre.org/software/S0576) has used code signing certificates issued to fake companies to bypass security controls.(Citatio...

References

Frequently Asked Questions

What is T1588.003 (Code Signing Certificates)?

T1588.003 is a MITRE ATT&CK technique named 'Code Signing Certificates'. It belongs to the Resource Development tactic(s). Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author an...

How can T1588.003 be detected?

Detection of T1588.003 (Code Signing Certificates) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1588.003?

There are 1 documented mitigations for T1588.003. Key mitigations include: Pre-compromise.

Which threat groups use T1588.003?

Known threat groups using T1588.003 include: Wizard Spider, OilRig, BlackTech, FIN8, Mustang Panda, Threat Group-3390, Kimsuky.