Tactic
Tactic_ID
ATA-006
Attackers can execute codes or malware, install tampered firmware by bypassing codes signing security mechanism. This is done by exploiting vulnerabilities such as "lack of verification", "obsolete certificates" or "insecure key management".