Common Information
Type Value
Value
Theft of Operational Information
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may steal operational information on a production environment as a direct mission outcome for personal gain or to inform future operations. This information may include design documents, schedules, rotational data, or similar artifacts that provide insight on operations. In the Bowman Dam incident, adversaries probed systems for operational data.
Details Published Attributes CTI Title
Details Website 2023-07-12 2 Dragos Enabled Defense Against APT Exploits for Rockwell Automation ControlLogix | Dragos
Details Website 2022-09-22 13 Control System Defense: Know the Opponent | CISA
Details Website 2022-04-13 43 INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant
Details Website 2022-04-13 47 APT Cyber Tools Targeting ICS/SCADA Devices | CISA
Details Website 2020-12-01 0 The Impact of Modern Ransomware on Manufacturing Networks
Details Website 2020-12-01 0 The Impact of Modern Ransomware on Manufacturing Networks