Detection of high CPU utilization on spacecraft systems, potentially caused by anomalous or unexpected activity. This indicator focuses on identifying when CPU load exceeds normal operational thresholds, especially due to the execution of processes that are not recognized as part of the normal spacecraft operations. Such activity could be indicative of a cyber attack, such as a resource exhaustion attack, where unauthorized processes or malware attempt to degrade system performance, leading to potential mission impacts or denial of service conditions.
ID | Name | Description | |
EX-0010 | Malicious Code | Threat actors may rely on other tactics and techniques in order to execute malicious code on the victim spacecraft. This can be done via compromising the supply chain or development environment in some capacity or taking advantage of known commands. However, once malicious code has been uploaded to the victim spacecraft, the threat actor can then trigger the code to run via a specific command or wait for a legitimate user to trigger it accidently. The code itself can do a number of different things to the hosted payload, subsystems, or underlying OS. | |
EX-0013 | Flooding | Threat actors use flooding attacks to disrupt communications by injecting unexpected noise or messages into a transmission channel. There are several types of attacks that are consistent with this method of exploitation, and they can produce various outcomes. Although, the most prominent of the impacts are denial of service or data corruption. Several elements of the spacecraft may be targeted by jamming and flooding attacks, and depending on the time of the attack, it can have devastating results to the availability of the system. |