Key Management Infrastructure Manipulation: Replace / generate new Master Keys

ID Name
T2013.001 Replace / generate new Session Keys
T2013.002 Replace / generate new Master Keys

Adversaries can replace the master key used to encrypt TM/TC in order to gain permanent access to other functionalities, or interrupt the owner's control by generating new ones.

ID: T2013.002
Sub-technique of:  T2013
Tactic: Persistence
Platforms: None
Version: 2.0
Created: 19 April 2023
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.