Esc
SIP and Trust Provider Hijacking - T1553.003
(ATT&CK® Technique)
Definition
Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. In user mode, Windows Authenticode digital signatures are used to verify a file's origin and integrity, variables that may be used to establish trust in signed code (ex: a driver with a valid Microsoft signature may be handled as safe). The signature validation process is handled via the WinVerifyTrust application programming interface (API) function, which accepts an inquiry and coordinates with the appropriate trust provider, which is responsible for validating parameters of a signature.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.