Common Information
Type Value
Value
Weaken Encryption - T1600
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key. Adversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device’s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts. (Citation: Cisco Blog Legacy Device Attacks)
Details Published Attributes CTI Title
Details Website 2023-07-25 0 Tuesday Morning Threat Report: Jul 25, 2023
Details Website 2023-07-22 0 Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands
Details Website 2023-07-21 0 Apple: Proposed UK law is a ‘serious, direct threat’ to security, privacy
Details Website 2023-06-08 0 EU Member States Still Cannot Agree About End-to-End Encryption
Details Website 2023-05-03 0 Tor Project, LGBTQ groups and CDT sound alarm over efforts to weaken encryption
Details Website 2023-03-30 0 UK Introduces Mass Surveillance With Online Safety Bill
Details Website 2023-03-20 0 A week in security (March 13 - 19)
Details Website 2023-03-09 0 WhatsApp and Signal unite against online safety bill amid privacy concerns
Details Website 2022-12-12 2 EU to Oppose the "Five Eyes" Weakening of Encrypted Communication
Details Website 2022-11-29 1 Cyber predictions | Professional Security
Details Website 2021-08-06 0 Apple to Scan Every Device for Child Abuse Content — But Experts Fear for Privacy
Details Website 2021-04-21 36 Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
Details Website 2021-04-20 102 Authentication Bypass Techniques and Pulse Secure Zero-Day
Details Website 2020-10-20 0 Attackers Continue to Target Legacy Devices
Details Website 2018-12-20 0 Encryption, Ghosts, Backdoors, Interception, and Information Security
Details Website 2017-06-15 0 Rapid7 issues comments on NAFTA renegotiation | Rapid7 Blog
Details Website 2015-11-16 0 Apple’s Tim Cook: There’ll be no backdoor in encryption | WeLiveSecurity
Details Website 2013-09-06 0 On the NSA