Esc
Software Update
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, .
Lateral Movement
Software Deployment Tools
Privilege Escalation
Boot or Logon Autostart Execution
Event Triggered Execution
Hijack Execution Flow
Impact
Inhibit System Recovery
Persistence
Server Software Component
Pre-OS Boot
Office Application Startup
Software Extensions
Boot or Logon Autostart Execution
Event Triggered Execution
Compromise Host Software Binary
Hijack Execution Flow
Initial Access
Supply Chain Compromise
Execution
Software Deployment Tools
Credential Access
Exploitation for Credential Access
Input Capture
Steal or Forge Authentication Certificates
Defense Evasion
System Binary Proxy Execution
Hide Artifacts
Trusted Developer Utilities Proxy Execution
Rootkit
Pre-OS Boot
Hijack Execution Flow
Virtualization/Sandbox Evasion
References
All
Patent
The following references were used to develop the Software Update knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Method and system for providing software updates to local machines
Reference Type: Patent Organization: Sophos Ltd Author: John Melton Reynolds