Common Information
Type | Value |
---|---|
Value |
Denial of View |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. An adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. In the Maroochy attack, the adversary was able to temporarily shut an investigator out of the network, preventing them from viewing the state of the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-09-22 | 13 | Control System Defense: Know the Opponent | CISA | ||
Details | Website | 2022-04-13 | 43 | INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant | ||
Details | Website | 2022-04-13 | 47 | APT Cyber Tools Targeting ICS/SCADA Devices | CISA | ||
Details | Website | 2021-02-11 | 0 | Visibility, Monitoring, and Critical Infrastructure Security - DomainTools | Start Here. Know Now. |