Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data.

Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

ID: TA0040
Created: 03 December 2023
Last Modified: 03 December 2023

Techniques

Techniques: 6
ID Name Description
T2083 Denial of Operational Adversaries may cause a denial of control to temporarily prevent driver from interacting with vehicle controls. An adversary may attempt to deny vehicle control access to cause a temporary loss of communication with the vehicle or to prevent driver adjustment of vehicle controls. An affected vehicle may still be operating during the period of control loss, but not necessarily in a desired state.
T2084 Loss of Financial Adversaries may cause a loss of financial impact to vehicle owners, road users and vehicle manufacturer through disruption and even damage to the availability and integrity of the vehicle or backend service. The damage and theft of vehicles can result in financial losses for their owners, while a denial of service to the backend service can lead to financial repercussions for the vehicle manufacturer.
T2085 Loss of Operational Adversaries may seek to achieve a sustained loss of operational or a runaway condition in which driver cannot issue any controls even if the malicious interference has subsided.This technique can result in the vehicle not working or showing unexpected behavior of core functions.
T2086 Loss of Safety Adversaries may compromise safety system functions designed to maintain safe operation of a process when unacceptable or dangerous conditions occur. Safety systems are often composed of the same elements as control systems but have the sole purpose of ensuring the process fails in a predetermined safe manner.
T2087 Manipulation of Operational Adversaries may manipulate the control of vehicle. Methods of manipulating control can include takeover the control of the vehicle, allowing adversaries to impact the core functioning of the vehicle.
T2088 Theft of Privacy Adversaries may steal privacy information in the vehicle environment. This information may include personally identifiable information, driver license, location tracking, dashcam record.