Adversary in the Middle: Satellite constellation

A satellite with stolen credential can take place into a dynamic constellation and collect data. [1]

ID: T1557.002
Sub-technique of:  T1557
Tactic: Collection
Platforms: Space Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References