Common Information
Type | Value |
---|---|
Value |
Denial of Control |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may cause a denial of control to temporarily prevent operators and engineers from interacting with process controls. An adversary may attempt to deny process control access to cause a temporary loss of communication with the control device or to prevent operator adjustment of process controls. An affected process may still be operating during the period of control loss, but not necessarily in a desired state. In the Maroochy attack, the adversary was able to temporarily shut an investigator out of the network preventing them from issuing any controls. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-07-25 | 5 | TETRA:BURST — 5 New Vulnerabilities Exposed in Widely Used Radio Communication System | ||
Details | Website | 2023-07-12 | 2 | Dragos Enabled Defense Against APT Exploits for Rockwell Automation ControlLogix | Dragos | ||
Details | Website | 2022-09-22 | 13 | Control System Defense: Know the Opponent | CISA | ||
Details | Website | 2022-04-13 | 43 | INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant | ||
Details | Website | 2022-04-13 | 47 | APT Cyber Tools Targeting ICS/SCADA Devices | CISA | ||
Details | Website | 2021-02-11 | 0 | Visibility, Monitoring, and Critical Infrastructure Security - DomainTools | Start Here. Know Now. |