test_scratch / cti-ATT-CK-v13.1 /ics-attack /attack-pattern /attack-pattern--5e0f75da-e108-4688-a6de-a4f07cc2cbe3.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
4.9 kB
{
"type": "bundle",
"id": "bundle--c569336f-0805-4abe-90cf-4520a8c58ed8",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-09T18:38:51.471Z",
"name": "Supply Chain Compromise",
"description": "Adversaries may perform supply chain compromise to gain control systems environment access by means of infected products, software, and workflows. Supply chain compromise is the manipulation of products, such as devices or software, or their delivery mechanisms before receipt by the end consumer. Adversary compromise of these products and mechanisms is done for the goal of data or system compromise, once infected products are introduced to the target environment. \n\nSupply chain compromise can occur at all stages of the supply chain, from manipulation of development tools and environments to manipulation of developed products and tools distribution mechanisms. This may involve the compromise and replacement of legitimate software and patches, such as on third party or vendor websites. Targeting of supply chain compromise can be done in attempts to infiltrate the environments of a specific audience. In control systems environments with assets in both the IT and OT networks, it is possible a supply chain compromise affecting the IT environment could enable further access to the OT environment. \n\nCounterfeit devices may be introduced to the global supply chain posing safety and cyber risks to asset owners and operators. These devices may not meet the safety, engineering and manufacturing requirements of regulatory bodies but may feature tagging indicating conformance with industry standards. Due to the lack of adherence to standards and overall lesser quality, the counterfeit products may pose a serious safety and operational risk. (Citation: Control Global May 2019) \n\nYokogawa identified instances in which their customers received counterfeit differential pressure transmitters using the Yokogawa logo. The counterfeit transmitters were nearly indistinguishable with a semblance of functionality and interface that mimics the genuine product. (Citation: Control Global May 2019) \n\nF-Secure Labs analyzed the approach the adversary used to compromise victim systems with Havex. (Citation: Daavid Hentunen, Antti Tikkanen June 2014) The adversary planted trojanized software installers available on legitimate ICS/SCADA vendor websites. After being downloaded, this software infected the host computer with a Remote Access Trojan (RAT).",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-ics-attack",
"phase_name": "initial-access"
}
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_deprecated": false,
"x_mitre_detection": "",
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_is_subtechnique": false,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_platforms": [
"Control Server",
"Data Historian",
"Field Controller/RTU/PLC/IED",
"Human-Machine Interface",
"Input/Output Server",
"Safety Instrumented System/Protection Relay"
],
"x_mitre_version": "1.1",
"x_mitre_data_sources": [
"File: File Metadata"
],
"type": "attack-pattern",
"id": "attack-pattern--5e0f75da-e108-4688-a6de-a4f07cc2cbe3",
"created": "2020-05-21T17:43:26.506Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T0862",
"external_id": "T0862"
},
{
"source_name": "Control Global May 2019",
"description": "Control Global 2019, May 29 Yokogawa announcement warns of counterfeit transmitters Retrieved. 2021/04/09 ",
"url": "https://www.controlglobal.com/industrynews/2019/yokogawa-announcement-warns-of-counterfeit-transmitters/"
},
{
"source_name": "Daavid Hentunen, Antti Tikkanen June 2014",
"description": "Daavid Hentunen, Antti Tikkanen 2014, June 23 Havex Hunts For ICS/SCADA Systems Retrieved. 2019/04/01 ",
"url": "https://www.f-secure.com/weblog/archives/00002718.html"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
]
}
]
}