Deploy Container

Adversaries may deploy containers as a means of executing arbitrary code within the context of vehicle cybersecurity. By leveraging container technology, adversaries can encapsulate malicious payloads and deploy them within the vehicle's software-defined architecture. This technique allows adversaries to bypass traditional security measures and execute unauthorized code within the vehicle's computing environment, potentially leading to unauthorized access, data theft, or disruption of critical vehicle functions.

For example, they could utilize containerization tools like Docker to create and start containers containing malicious payloads that can compromise the integrity and safety of critical vehicle functions. This could enable adversaries to gain unauthorized access to vehicle systems, manipulate sensitive data, or disrupt the normal operation of the vehicle, posing serious safety and security risks.

ID: T2014
Sub-techniques:  No sub-techniques
Tactic: Execution
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1610

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.