Credential Access
The adversary is trying to steal account names and passwords.
Technique-ID | Title | Description |
---|---|---|
ATE-054 | Adversary-in-the-Middle |
Attackers intercepting and potentially altering communications between two vehicle components or systems. This can lead to unauthorized access or manipulation of sensitive data, such as authentication credentials or command signals, compromising the integrity and security of the entire vehicle system. |
ATE-055 | Brute Force |
Adversaries attempt to crack passwords, credentials, and encryption keys through trial and error. The attackers try multiple usernames, passwords, tokens and test a variety of combinations until they gain access to vehicles. |
ATE-056 | Input Capture |
Input capture is a technique that can intercept user input. The malware can pretend to be a legitimate keyboard app. The data entered, such as login information, can be intercepted. |
ATE-057 | SMS Message Capture |
An attacker can intercept SMS messages sent or received from the vehicle. Through this technique, important information can be obtained. SMS is used for multi factor authentication. |
ATE-058 | Network Sniffing |
By sniffing a network, an Adversaries can learn more about the vehicle architecture, individual components and their functionality. By sniffing, he can obtain confidential data and access data that will help him to achieve his goals. |
ATE-059 | OS Credential Dumping |
Attackers extract authentication credentials, like passwords or tokens, directly from the OS. This could grant unauthorized access to critical systems or software components. |
ATE-060 | Unsecured Credentials |
Exploiting credentials that are inadequately protected or stored, such as plaintext passwords in vehicle software or rail control systems, allowing unauthorized system access. |
ATE-061 | Exploit TEE Vulnerability |
Attackers target vulnerabilities in the TEE . In vehicles, exploiting TEE can compromise security features designed to protect sensitive data or operations. |