Common Information
Type | Value |
---|---|
Value |
Damage to Property |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may cause damage and destruction of property to infrastructure, equipment, and the surrounding environment when attacking control systems. This technique may result in device and operational equipment breakdown, or represent tangential damage from other techniques used in an attack. Depending on the severity of physical damage and disruption caused to control processes and systems, this technique may result in Loss of Safety. Operations that result in Loss of Control may also cause damage to property, which may be directly or indirectly motivated by an adversary seeking to cause impact in the form of Loss of Productivity and Revenue. The German Federal Office for Information Security (BSI) reported a targeted attack on a steel mill under an incidents affecting business section of its 2014 IT Security Report. These targeted attacks affected industrial operations and resulted in breakdowns of control system components and even entire installations. As a result of these breakdowns, massive impact and damage resulted from the uncontrolled shutdown of a blast furnace. In the Maroochy Attack, Vitek Boden gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. The raw sewage affected local parks, rivers, and even a local hotel. This resulted in harm to marine life and produced a sickening stench from the community's now blackened rivers. A Polish student used a remote controller device to interface with the Lodz city tram system in Poland.345 Using this remote, the student was able to capture and replay legitimate tram signals. This resulted in damage to impacted trams, people, and the surrounding property. Reportedly, four trams were derailed and were forced to make emergency stops.4 Commands issued by the student may have also resulted in tram collisions, causing harm to those on board and the environment outside. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-07-20 | 0 | Ukraine takes down massive bot farm, seizes 150,000 SIM cards - RedPacket Security | ||
Details | Website | 2023-07-19 | 0 | Ukraine takes down massive bot farm, seizes 150,000 SIM cards | ||
Details | Website | 2022-11-10 | 0 | Proposal to amend South Africa’s constitution for Cyber Commissioner | ||
Details | Website | 2022-10-20 | 0 | Lloyd's requirements for state-backed cyber-attack exclusions | ||
Details | Website | 2022-04-13 | 43 | INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant | ||
Details | Website | 2022-04-13 | 47 | APT Cyber Tools Targeting ICS/SCADA Devices | CISA | ||
Details | Website | 2022-02-16 | 10 | SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification |