Unexpected Modification of Memory Location Associated with Payload Data

Detection of an unexpected modification in the payload memory block associated with payload data. The system identifies abnormal write operations in memory locations that store payload information before it is transmitted, suggesting manipulation by malware. Adversaries may change payload data before downlink in order to disrupt operations.

STIX Pattern

[x-opencti-memory:block = 'payload_memory_block' AND x-opencti-memory:write_operation = 'unexpected']

SPARTA TTPs

ID Name Description
EX-0012.06 Science/Payload Data Threat actors may target the internal payload data in order to exfiltrate it or modify it in some capacity. Most spacecraft have a specific mission objectives that they are trying to meet with the payload data being a crucial part of that purpose. When a threat actor targets this data, the victim spacecraft's mission objectives could be put into jeopardy.