Disruption

Measures designed to temporarily impair the use or access to a system for a period of time. Threat actors may seek to disrupt communications from the victim spacecraft to the ground controllers or other interested parties. By disrupting communications during critical times, there is the potential impact of data being lost or critical actions not being performed. This could cause the spacecraft's purpose to be put into jeopardy depending on what communications were lost during the disruption. This behavior is different than Denial as this attack can also attempt to modify the data and messages as they are passed as a way to disrupt communications.

ID: IMP-0002
Sub-techniques: 
Related MITRE ATT&CK TTPs: 
Tactic:
Created: 2022/10/19
Last Modified: 2023/07/18

Countermeasures

ID Name Description NIST Rev5 D3FEND ISO 27001
CM0000 Countermeasure Not Identified This technique is a result of utilizing TTPs to create an impact and the applicable countermeasures are associated with the TTPs leveraged to achieve the impact None

Related CWE Classes

Priority 1 Priority 2 Priority 3 Priority 4
CWE-118: Incorrect Access of Indexable Resource ('Range Error') CWE-345: Insufficient Verification of Data Authenticity CWE-1023: Incomplete Comparison with Missing Factors CWE-114: Process Control
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-404: Improper Resource Shutdown or Release CWE-400: Uncontrolled Resource Consumption CWE-642: External Control of Critical State Data
CWE-1263: Improper Physical Access Control CWE-684: Incorrect Provision of Sensitive Information CWE-657: Violation of Secure Design Principles CWE-669: Incorrect Resource Transfer Between Spheres
CWE-1384: Insecure Default Variable Initialization CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-671: Lack of Accounting for Security Implications in Design CWE-913: Improper Control of Dynamically-Managed Code Resources
CWE-1391: Improperly Implemented Security Check for Standard CWE-912: Hidden Functionality CWE-704: Incorrect Type Conversion or Cast CWE-922: Insecure Storage of Sensitive Information
CWE-172: Encoding Error
CWE-20: Improper Input Validation
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-506: Embedded Malicious Code
CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CWE-662: Improper Synchronization
CWE-665: Improper Initialization
CWE-667: Improper Locking
CWE-696: Incorrect Behavior Order
CWE-732: Incorrect Permission Assignment for Critical Resource
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-834: Excessive Iteration

Indicators of Behavior

ID Name Description STIX Pattern

References