Resources • Webinars
The Detection Series: Installer packages
Experts from Red Canary and MITRE ATT&CK® examine how installer packages work on different operating systems, analyze the ways adversaries are currently abusing them, and demonstrate how organizations can analyze the contents of installer packages and defend against malicious installers.
On-Demand
60 mins.
Virtual
Experts from Red Canary and MITRE ATT&CK® examine how installer packages work on different operating systems, analyze the ways adversaries are currently abusing them, and demonstrate how organizations can analyze the contents of installer packages and defend against malicious installers.
T1546.016: Installer Packages is a MITRE ATT&CK® technique that covers adversary abuse of packaging formats designed to simplify the packaging, installation, and update process for applications. These packages can contain scripts, resources, or other information that an application may need in order to run on an operating system. Developers, administrators, and users routinely run installer packages to install legitimate software. However, adversaries also abuse installer packages by modifying scripts or otherwise embedding malicious payloads within malicious installers masquerading as legitimate software.
Microsoft’s MSIX format for Windows is quickly emerging as a reliable format for adversaries to package malicious fake installers, enabling them to deliver payloads, evade defensive controls, and more. However, this is not limited just to Windows or MSIX. Different operating systems use different installer package formats—sometimes more than one—and adversaries have abused installer packages on macOS in addition to Windows.
Attendees will walk away from this webinar with:
- A better understanding of installer packaging formats and how adversaries leverage them to perform malicious activity
- Knowledge of which data and log sources offer visibility into malicious installer package activity
- How to develop reliable detection coverage for T1546.016: Installer Packages
Last but not least, we introduce you to a new free tool that you can use to investigate the contents of certain installer packages and share testing strategies you can use to validate your defensive controls against malicious installer packages.