test_scratch / cti-ATT-CK-v13.1 /ics-attack /attack-pattern /attack-pattern--3b6b9246-43f8-4c69-ad7a-2b11cfe0a0d9.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.21 kB
{
"type": "bundle",
"id": "bundle--9d54ffc4-b169-424b-9f29-518fa793576b",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-09T18:38:51.471Z",
"name": "Rootkit",
"description": "Adversaries may deploy rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting and modifying operating-system API calls that supply system information. Rootkits or rootkit-enabling functionality may reside at the user or kernel level in the operating system, or lower. (Citation: Enterprise ATT&CK January 2018) \n\nFirmware rootkits that affect the operating system yield nearly full control of the system. While firmware rootkits are normally developed for the main processing board, they can also be developed for the I/O that is attached to an asset. Compromise of this firmware allows the modification of all of the process variables and functions the module engages in. This may result in commands being disregarded and false information being fed to the main device. By tampering with device processes, an adversary may inhibit its expected response functions and possibly enable [Impact](https://attack.mitre.org/tactics/TA0105).",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-ics-attack",
"phase_name": "evasion"
},
{
"kill_chain_name": "mitre-ics-attack",
"phase_name": "inhibit-response-function"
}
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_is_subtechnique": false,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_platforms": [
"Field Controller/RTU/PLC/IED"
],
"x_mitre_version": "1.1",
"x_mitre_data_sources": [
"Firmware: Firmware Modification"
],
"type": "attack-pattern",
"id": "attack-pattern--3b6b9246-43f8-4c69-ad7a-2b11cfe0a0d9",
"created": "2020-05-21T17:43:26.506Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T0851",
"external_id": "T0851"
},
{
"source_name": "Enterprise ATT&CK January 2018",
"description": "Enterprise ATT&CK 2018, January 11 Rootkit Retrieved. 2018/05/16 ",
"url": "https://attack.mitre.org/wiki/Technique/T1014"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
]
}
]
}