Naziv |
Replace Trusted Executable |
---|---|
Sažetak | An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called. |
Preduvjeti | no |
Rješenja | no |