Impact
The adversary is trying to manipulate, interrupt, or destroy your systems and data.
Technique-ID | Title | Description |
---|---|---|
ATE-098 | Denial of Control |
Attackers disrupting a vehicle's control systems, preventing operators or automated systems from making desired actions, critical in scenarios like emergency braking in both automotive and rail contexts. |
ATE-099 | Denial of View |
Attackers obscure or manipulate the data presented to vehicle operators or sensors, potentially causing misjudgments. For instance, altering camera feeds or sensor data can mislead a train conductor or autonomous car system. |
ATE-100 | Loss of Control |
Attackers seize control of specific vehicle functions, overriding operator inputs. In the rail context, this could mean unauthorized control of train speeds, while in cars, it might involve steering or acceleration. |
ATE-101 | Enable premium features |
Attackers unlock features that are typically behind a paywall or not activated, such as advanced navigation systems or entertainment features, without proper authorization. |
ATE-102 | Chip Tuning |
This refers to the modification of the ECU to enhance a vehicle's performance, potentially compromising safety standards and regulatory compliances. |
ATE-103 | Odometer fraud |
Attackers manipulate the vehicle's odometer readings, typically to reduce the displayed mileage, affecting the vehicle's resale value and potentially misleading buyers about its usage history. |
ATE-104 | Vehicle Theft |
Attackers leveraging cyber vulnerabilities to bypass security measures and steal the vehicle, which can be applicable to both vehicles and specialized rail equipment. |