Gather Victim Mission Information

An attacker tries to gather information about a specific mission to target it. An attacker can find information about firmware, software, hardware, frequencies, protocols, cryptographic algorithms, spacecraft descriptors used in a mission, and other knowledge like the spacecraft design, architecture, position and trajectory. The application of this technique in the supply chain can lead to a software/tools/datasheets or a design leak. If COTS or open-source components are used, information can be easily gathered online or from the producing company.

Relevant standards: [1][2]

ID: T2002
Sub-techniques:  T2002.009, T2002.010, T2002.011
Tactic: Reconnaissance
Platforms: None
Version: 2.0
Created: 26 August 2022
Last Modified: 28 November 2024

Mitigations

ID Mitigation Description
M2035 Proper Information Classification and Flow-Down Guidelines
M1017 User Training

References