Common Information
Type | Value |
---|---|
Value |
Theft of Operational Information |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may steal operational information on a production environment as a direct mission outcome for personal gain or to inform future operations. This information may include design documents, schedules, rotational data, or similar artifacts that provide insight on operations. In the Bowman Dam incident, adversaries probed systems for operational data. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-07-12 | 2 | Dragos Enabled Defense Against APT Exploits for Rockwell Automation ControlLogix | Dragos | ||
Details | Website | 2022-09-22 | 13 | Control System Defense: Know the Opponent | CISA | ||
Details | Website | 2022-04-13 | 43 | INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant | ||
Details | Website | 2022-04-13 | 47 | APT Cyber Tools Targeting ICS/SCADA Devices | CISA | ||
Details | Website | 2020-12-01 | 0 | The Impact of Modern Ransomware on Manufacturing Networks | ||
Details | Website | 2020-12-01 | 0 | The Impact of Modern Ransomware on Manufacturing Networks |