Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. This is the process of identifying development requirements and building solutions such as malware, exploits, and self-signed certificates. Adversaries may develop capabilities to support their operations throughout numerous phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: Bitdefender StrongPity June 2020)(Citation: Talos Promethium June 2020)
As with legitimate development efforts, different skill sets may be required for developing capabilities. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the capability.
- ATT&CK ID
- T1587
- STIX ID
- attack-pattern--edadea33-549c-4ed1-9783-8f5a5853cbdf
- Name
- Develop Capabilities
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.T0017 - Develop Capabilities
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.