Detection of the system becoming unresponsive due to excessive consumption of memory, CPU, and storage resources. This is likely caused by a malicious process (e.g., a fork bomb or other attack) that exhausts system resources, leading to system failure or a crash.
ID | Name | Description | |
EX-0010 | Malicious Code | Threat actors may rely on other tactics and techniques in order to execute malicious code on the victim spacecraft. This can be done via compromising the supply chain or development environment in some capacity or taking advantage of known commands. However, once malicious code has been uploaded to the victim spacecraft, the threat actor can then trigger the code to run via a specific command or wait for a legitimate user to trigger it accidently. The code itself can do a number of different things to the hosted payload, subsystems, or underlying OS. |