Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database to execute malicious applications with elevated permissions.
Sub-technique of
T1548
See: MITRE ATT&CK
Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database to execute malicious applications with elevated permissions.
Sub-technique of
T1548
See: MITRE ATT&CK