Threat actors may gather information about the victim spacecraft's descriptors that can be used for future campaigns or to help perpetuate other techniques. Information about the descriptors may include a variety of details such as identity attributes, organizational structures, and mission operational parameters.
Priority 1 | Priority 2 | Priority 3 | Priority 4 |
CWE-285: Improper Authorization | CWE-200: Information Exposure | ||
CWE-522: Insufficiently Protected Credentials |
ID | Name | Description | STIX Pattern |