Backdoor Installation: Transponder reconfiguration

An attacker can change the transponder configuration to permit a future radio access on the resource. [1]

ID: T2014.004
Sub-technique of:  T2014
Tactic: Persistence
Platforms: Space Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References