Loss of Availability

From attackics
Jump to navigation Jump to search
Loss of Availability
Technique
ID T826
Tactic Impact

Description

Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services.123

Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.


Examples

  • A Conficker infection at a nuclear power plant forced the facility to temporarily shutdown.4