test_scratch / cti-ATT-CK-v13.1 /ics-attack /attack-pattern /attack-pattern--56ddc820-6cfb-407f-850b-52c035d123ac.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.83 kB
{
"type": "bundle",
"id": "bundle--4113ee5d-0eb1-4d5b-a51b-a72b1fc15b28",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-30T20:16:25.031Z",
"name": "Denial of View",
"description": "Adversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) \n\nAn adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. ",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-ics-attack",
"phase_name": "impact"
}
],
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_is_subtechnique": false,
"x_mitre_platforms": [
"None"
],
"x_mitre_version": "1.1",
"type": "attack-pattern",
"id": "attack-pattern--56ddc820-6cfb-407f-850b-52c035d123ac",
"created": "2020-05-21T17:43:26.506Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T0815",
"external_id": "T0815"
},
{
"source_name": "Corero",
"description": "Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 ",
"url": "https://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf"
},
{
"source_name": "Michael J. Assante and Robert M. Lee",
"description": "Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 ",
"url": "https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297"
},
{
"source_name": "Tyson Macaulay",
"description": "Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04 ",
"url": "https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}