Retrieve TT&C master/session keys

The attacker gains knowledge of a Session or Master Key. In general, there isn't immediate way to uncover this corruption, until it is used to modify the system's behaviour. In case of a suspicious key corruption, the key replacement shall be executed as soon as possible. [1] [2]

Standard/references: [1] [2]

ID: T2015
Sub-techniques:  T2015.001, T2015.002, T2015.003
Platforms: Ground Segment, Space-link communication
Version: 2.0
Created: 25 August 2022
Last Modified: 22 April 2023

Mitigations

References