Skip to content

Software Update Manipulation

Software Update Manipulation is a sophisticated supply chain compromise method where attackers modify legitimate software updates to distribute malware, establishing unauthorized access to target systems. Operating within the Gain Access phase, this technique exploits the trusted relationship between software providers and their users by intercepting and tampering with update packages during distribution, altering update verification mechanisms, or compromising update servers directly. Attackers leverage this approach because software updates are routinely deployed across organizations with minimal scrutiny and often execute with elevated privileges. The technique has been demonstrated in high-profile attacks such as the NotPetya campaign—where compromised Ukrainian accounting software M.E.Doc was used to distribute destructive malware—and the SolarWinds incident, where attackers inserted malicious code into the Orion platform's update process, affecting thousands of organizations. Successful exploitation provides attackers with the same access level as the compromised software, potentially enabling system-wide compromise, persistence through subsequent updates, and the ability to bypass security controls that trust signed updates from established vendors.