← Back to Explore
T1176
Software Extensions
Adversaries may abuse software extensions to establish persistent access to victim systems. Software extensions are modular components that enhance or customize the functionality of software applications, including web browsers, Integrated Development Environments (IDEs), and other platforms.(Citation: Chrome Extension C2 Malware)(Citation: Abramovsky VSCode Security) Extensions are typically installed via official marketplaces, app stores, or manually loaded by users, and they often inherit the...
LinuxmacOSWindows
3
Detections
1
Sources
0
Threat Actors
BY SOURCE
3elastic
PROCEDURES (3)
Process Creation Monitoring1 detections
Auto-extracted: 1 detections for process creation monitoring
Persist1 detections
Auto-extracted: 1 detections for persist
Persist1 detections
Auto-extracted: 1 detections for persist