Common Information
Type Value
Value
Denial of Service
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment. Some ICS devices are particularly sensitive to DoS events, and may become unresponsive in reaction to even a simple ping sweep. Adversaries may also attempt to execute a Permanent Denial-of-Service (PDoS) against certain devices, such as in the case of the BrickerBot malware. Adversaries may exploit a software vulnerability to cause a denial of service by taking advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in software that can be used to cause a or denial of service condition. Adversaries may have prior knowledge about industrial protocols or control devices used in the environment through Control Device Identification. There are examples of adversaries remotely causing a Device Restart/Shutdown by exploiting a vulnerability that induces uncontrolled resource consumption. In the Maroochy attack, the adversary was able to shut an investigator out of the network.
Details Published Attributes CTI Title
Details Website 2083-07-04 9 SonicWall VPN Portal Critical Flaw (CVE-2020-5135)
Details Website 2070-01-03 13 越狱 Llama-3.1-8B-Instruct | CTF导航
Details Website 2024-11-17 30 Cyber ​​Threats to E-Voting
Details Website 2024-11-17 0 Buffer Overflow Attacks: Best Practices Against it in Cybersecurity.
Details Website 2024-11-16 0 Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-11-16 0 Exploring Side-Channel Attacks: Understanding the Risks and Defenses
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Banking Industry Cyber Security Solutions
Details Website 2024-11-15 2 Fresh Phish: Harvesting Your Credentials Using Controversial Telegram Bots
Details Website 2024-11-15 2 Godlike Firewall Protection Review
Details Website 2024-11-15 1 OWASP Top 10 for LLMs: Protecting GenAI with AiFort
Details Website 2024-11-15 103 Microsoft's Security Update in November on High-Risk Vulnerabilities in Multiple Products - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2024-11-15 0 BSI’s 2024 Cybersecurity Report: How Germany Is Battling Ransomware, APTs, and Election Security Challenges
Details Website 2024-11-15 0 How AI is Revolutionizing Application Security: Real-Life Impact and Future Potential 🚀
Details Website 2024-11-15 0 Top industries facing cyber threats - Cybersecurity Insiders
Details Website 2024-11-14 0 Malicious Software: A Pervasive Threat to Digital Security
Details Website 2024-11-14 1 How Vodien Enhances Website Security With SSL Certificates
Details Website 2024-11-14 2 How the Web Works — THM Pre Security Learning Path Rooms 3 and 4
Details Website 2024-11-14 3 Germany's Cyber Threat Landscape Grows Resilient Under Fire
Details Website 2024-11-14 7 GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster
Details Website 2024-11-14 0 What is a Website Waiting Room?
Details Website 2024-11-13 22 Anomaly Detection in Network Traffic Using Python
Details Website 2024-11-13 0 China’s Trump Cards for Trump 2.0
Details Website 2024-11-13 98 November Patch Tuesday loads up everyone’s plate
Details Website 2024-11-13 0 The Road Ahead: 2025 Cybersecurity Predictions - ReliaQuest