{ "type": "bundle", "id": "bundle--09baf50c-8d59-4c7e-8229-1d4c6bb0b379", "spec_version": "2.0", "objects": [ { "modified": "2023-05-08T20:13:24.241Z", "name": "Data Historian Compromise", "description": "Adversaries may compromise and gain control of a data historian to gain a foothold into the control system environment. Access to a data historian may be used to learn stored database archival and analysis information on the control system. A dual-homed data historian may provide adversaries an interface from the IT environment to the OT environment. \n\nDragos has released an updated analysis on CrashOverride that outlines the attack from the ICS network breach to payload delivery and execution. (Citation: Industroyer - Dragos - 201810) The report summarized that CrashOverride represents a new application of malware, but relied on standard intrusion techniques. In particular, new artifacts include references to a Microsoft Windows Server 2003 host, with a SQL Server. Within the ICS environment, such a database server can act as a data historian. Dragos noted a device with this role should be \"expected to have extensive connections\" within the ICS environment. Adversary activity leveraged database capabilities to perform reconnaissance, including directory queries and network connectivity checks.\n\nPermissions Required: Administrator\n\nContributors: Joe Slowik - Dragos", "kill_chain_phases": [ { "kill_chain_name": "mitre-ics-attack", "phase_name": "initial-access" } ], "x_mitre_attack_spec_version": "2.1.0", "x_mitre_contributors": [ "Joe Slowik - Dragos" ], "x_mitre_deprecated": true, "x_mitre_domains": [ "ics-attack" ], "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_platforms": [ "Windows" ], "x_mitre_version": "1.0", "x_mitre_permissions_required": [ "Administrator" ], "type": "attack-pattern", "id": "attack-pattern--50d3222f-7550-4a3c-94e1-78cb6c81d064", "created": "2020-05-21T17:43:26.506Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "mitre-ics-attack", "url": "https://attack.mitre.org/techniques/T0810", "external_id": "T0810" }, { "source_name": "Industroyer - Dragos - 201810", "description": "Dragos. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved October 14, 2019.", "url": "https://dragos.com/wp-content/uploads/CRASHOVERRIDE2018.pdf" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "x_mitre_is_subtechnique": false } ] }