CAPEC-529 Malware-Directed Internal Reconnaissance

CAPEC ID: 529

CAPEC-529 Metadata

Likelihood of Attack

Medium

Typical Severity

Medium

Overview

Summary

Adversary uses malware or a similarly controlled application installed inside an organizational perimeter to gather information about the composition, configuration, and security mechanisms of a targeted application, system or network.

Prerequisites

The adversary must have internal, logical access to the target network and system.

Potential Solutions / Mitigations

Keep patches up to date by installing weekly or daily if possible. Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.

Related CAPECs

CAPEC ID Description
CAPEC-169 An adversary engages in probing and exploration activities to identify constituents and properties of the target.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.