Indicator Removal on Host: Clear Log/Command History

If a log is available, an attacker can delete logging onboard the spacecraft to hide illegitimate operations (a TC log service is usually not implemented). [1]

ID: T1070.001
Sub-technique of:  T1070
Tactic: Defense Evasion
Platforms: Ground Segment, Space Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 05 February 2025

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References