Credential Access

The adversary is trying to steal account names and passwords.

Domain
Automotive
Rail
Technique-ID Title Description
ATE-054 Adversary-in-the-Middle

Attackers intercepting and potentially altering communications between two vehicle components or systems. This can lead to unauthorized access or manipulation of sensitive data, such as authentication credentials or command signals, compromising the integrity and security of the entire vehicle system.

ATE-055 Brute Force

Adversaries attempt to crack passwords, credentials, and encryption keys through trial and error. The attackers try multiple usernames, passwords, tokens and test a variety of combinations until they gain access to vehicles.

ATE-056 Input Capture

Input capture is a technique that can intercept user input. The malware can pretend to be a legitimate keyboard app. The data entered, such as login information, can be intercepted.

ATE-057 SMS Message Capture

An attacker can intercept SMS messages sent or received from the vehicle. Through this technique, important information can be obtained. SMS is used for multi factor authentication.

ATE-058 Network Sniffing

By sniffing a network, an Adversaries can learn more about the vehicle architecture, individual components and their functionality. By sniffing, he can obtain confidential data and access data that will help him to achieve his goals.

ATE-059 OS Credential Dumping

Attackers extract authentication credentials, like passwords or tokens, directly from the OS. This could grant unauthorized access to critical systems or software components.

ATE-060 Unsecured Credentials

Exploiting credentials that are inadequately protected or stored, such as plaintext passwords in vehicle software or rail control systems, allowing unauthorized system access.

ATE-061 Exploit TEE Vulnerability

 Attackers target vulnerabilities in the TEE . In vehicles, exploiting TEE can compromise security features designed to protect sensitive data or operations.