Loss of Control

From attackics
Jump to navigation Jump to search
Loss of Control
Technique
ID T827
Tactic Impact
External Contributors Dragos Threat Intelligence

Description

Adversaries may seek to achieve a sustained loss of control or a runaway condition in which operators cannot issue any commands even if the malicious interference has subsided.123


Procedure Examples

  • Industroyer's data wiper component removes the registry "image path" throughout the system and overwrites all files, rendering the system unusable.4
  • Some of Norsk Hydro's production systems were impacted by a LockerGoga infection. This resulted in a loss of control which forced the company to switch to manual operations.56