test_scratch
/
cti-ATT-CK-v13.1
/ics-attack
/attack-pattern
/attack-pattern--56ddc820-6cfb-407f-850b-52c035d123ac.json
{ | |
"type": "bundle", | |
"id": "bundle--4113ee5d-0eb1-4d5b-a51b-a72b1fc15b28", | |
"spec_version": "2.0", | |
"objects": [ | |
{ | |
"modified": "2023-03-30T20:16:25.031Z", | |
"name": "Denial of View", | |
"description": "Adversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) \n\nAn adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. ", | |
"kill_chain_phases": [ | |
{ | |
"kill_chain_name": "mitre-ics-attack", | |
"phase_name": "impact" | |
} | |
], | |
"x_mitre_deprecated": false, | |
"x_mitre_detection": "", | |
"x_mitre_domains": [ | |
"ics-attack" | |
], | |
"x_mitre_is_subtechnique": false, | |
"x_mitre_platforms": [ | |
"None" | |
], | |
"x_mitre_version": "1.1", | |
"type": "attack-pattern", | |
"id": "attack-pattern--56ddc820-6cfb-407f-850b-52c035d123ac", | |
"created": "2020-05-21T17:43:26.506Z", | |
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", | |
"revoked": false, | |
"external_references": [ | |
{ | |
"source_name": "mitre-attack", | |
"url": "https://attack.mitre.org/techniques/T0815", | |
"external_id": "T0815" | |
}, | |
{ | |
"source_name": "Corero", | |
"description": "Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 ", | |
"url": "https://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf" | |
}, | |
{ | |
"source_name": "Michael J. Assante and Robert M. Lee", | |
"description": "Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 ", | |
"url": "https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297" | |
}, | |
{ | |
"source_name": "Tyson Macaulay", | |
"description": "Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04 ", | |
"url": "https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false" | |
} | |
], | |
"object_marking_refs": [ | |
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" | |
], | |
"x_mitre_attack_spec_version": "3.1.0", | |
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" | |
} | |
] | |
} |