test_scratch / cti-ATT-CK-v13.1 /ics-attack /attack-pattern /attack-pattern--1c478716-71d9-46a4-9a53-fa5d576adb60.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.33 kB
{
"type": "bundle",
"id": "bundle--171b7d8c-480a-4d85-8ae1-5f1a0a9bc9ae",
"spec_version": "2.0",
"objects": [
{
"modified": "2022-10-20T21:02:54.674Z",
"name": "Block Serial COM",
"description": "Adversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages. \n\nA serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-ics-attack",
"phase_name": "inhibit-response-function"
}
],
"x_mitre_detection": "",
"x_mitre_platforms": [
"Field Controller/RTU/PLC/IED",
"Input/Output Server",
"Device Configuration/Parameters"
],
"x_mitre_is_subtechnique": false,
"x_mitre_deprecated": false,
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_version": "1.1",
"x_mitre_data_sources": [
"Operational Databases: Process/Event Alarm",
"Process: Process Termination",
"Operational Databases: Process History/Live Data",
"Application Log: Application Log Content",
"Network Traffic: Network Traffic Flow"
],
"type": "attack-pattern",
"id": "attack-pattern--1c478716-71d9-46a4-9a53-fa5d576adb60",
"created": "2020-05-21T17:43:26.506Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T0805",
"external_id": "T0805"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}