CAPEC Details
Name Targeted Malware
Likelyhood of attack Typical severity
Low Low
Summary An adversary develops targeted malware that takes advantage of a known vulnerability in an organizational information technology environment. The malware crafted for these attacks is based specifically on information gathered about the technology environment. Successfully executing the malware enables an adversary to achieve a wide variety of negative technical impacts.
Prerequisites
Solutions
Related CAPECS
CAPEC ID Description
CAPEC-549 An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others.
CAPEC-662 An adversary exploits security vulnerabilities or inherent functionalities of a web browser, in order to manipulate traffic between two endpoints.
Taxonomy: ATTACK
Entry ID Entry Name
1587.001 Develop Capabilities: Malware
1027 Obfuscated Files or Information