Common Information
Type Value
Value
Denial of View
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. An adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. In the Maroochy attack, the adversary was able to temporarily shut an investigator out of the network, preventing them from viewing the state of the system.
Details Published Attributes CTI Title
Details Website 2022-09-22 13 Control System Defense: Know the Opponent | CISA
Details Website 2022-04-13 43 INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems | Mandiant
Details Website 2022-04-13 47 APT Cyber Tools Targeting ICS/SCADA Devices | CISA
Details Website 2021-02-11 0 Visibility, Monitoring, and Critical Infrastructure Security - DomainTools | Start Here. Know Now.