{"id":2474,"date":"2023-10-10T16:49:39","date_gmt":"2023-10-10T14:49:39","guid":{"rendered":"https:\/\/www.spacesecurity.info\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/"},"modified":"2025-01-13T16:52:42","modified_gmt":"2025-01-13T15:52:42","slug":"an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/","title":{"rendered":"An analysis of the Viasat cyber attack with the MITRE ATT&#038;CK\u00ae framework"},"content":{"rendered":"<h2>Disclaimer<\/h2>\n<p>To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University). In their open-source intelligence, they reconstructed the lifecycle of the attack. They specified that however, without first-hand knowledge of ViaSat\u2019s systems, they cannot be certain about their hypothesis. With their open-source intelligence, they schematized the entire attack lifecycle in a diagram.<\/p>\n<p>Viasat\u2019s statement (2) on Wednesday, March 30th, 2022 provides a somewhat plausible but incomplete description of the attack.<\/p>\n<p>In a statement disseminated to journalists (3), Viasat confirmed the use of the AcidRain wiper in the February 24th attack against their modems.<\/p>\n<p>At the DefCon 31, Mark Colaluca and Nick Saunders from Viasat presented a talk named &#8220;<a href=\"https:\/\/youtu.be\/qI_ICtX3Gm8?si=yraxgbB6rp2TgTb2\">Defending KA-SAT<\/a>&#8220;. During this talk, they argued not to believe everything that you can read on the internet. It&#8217;s often simply inaccurate. They told that there is no evidence or proof of the claims. There is no evidence of any compromise or tampering with Viasat modem software or firmware images and no evidence of any supply-chain interference. Regarding, the possibility that wipermalware was deployed and erased the hard drives of the modems, they answered that modems don&#8217;t have hard drives.<\/p>\n<p>At the Black Hat USA 2023, Mark Colaluca , Craig Miller , Nick Saunders , Michael Sutton , Kristina Walter from Viasat presented a talk named &#8220;<a href=\"https:\/\/www.youtube.com\/watch?v=RdjthhBylMk\">Lessons Learned from the KA-SAT Cyberattack: Response, Mitigation and Information Sharing<\/a>&#8220;. This presentation will provide the most detailed public presentation of the KA-SAT event. Viasat will share the story of how it responded and performed a rapid forensic on several impacted terminals. This presentation will explain details around the forensic analysis that have not previously been publicly shared by Viasat, as well as the process of reverse engineering the malicious toolkit to verify it would produce the observed flash memory effects. Both Viasat and NSA will offer their lessons learned from the cyberattack and advise on how commercial and government organizations can follow this model to partner both in response to and preparation for future attacks.<\/p>\n<h2>Introduction<\/h2>\n<p>In this article, we will go through the Viasat cyber attack that occured on 24 February, 2022. The goal is to do a modelisation of this attack based on the MITRE ATT&amp;CK framework.<\/p>\n<p>The first question will be to explain why to use the MITRE ATT&amp;CK framework to do this analysis while there are others frameworks and methodologies that can be used for the space sector.<\/p>\n<p>The next work will be to identify Tactics, Techniques and Procedures (TTPs) from the MITRE ATT&amp;CK matrix that have been used by the hackers during the Viasat attack. To learn more about the MITRE ATT&amp;CK framework, you can go to this <a href=\"https:\/\/www.spacesecurity.info\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/\">article<\/a> about the ATT&amp;Ck v13 release.<\/p>\n<p>Once TTP identified, we will map the TTPs on the <a href=\"https:\/\/mitre-attack.github.io\/attack-navigator\/\">ATT&amp;CK Navigator<\/a> in order to have the complete attack chain as a cyber kill chain.<\/p>\n<h2>About the Viasat hack in brief<\/h2>\n<p>The Viasat hack was a cyberattack on American communications company Viasat affecting their KA-SAT network, on 24 February, 2022.<\/p>\n<p>Thousands of Viasat modems got hacked by a &#8220;deliberate &#8230; cyber event&#8221;. Thousands of customers in Europe have been without internet for a month since. During the same time, remote control of 5,800 wind turbines belonging to Enercon in Central Europe was affected.<\/p>\n<p>According to Viasat, the attacker used a poorly configured virtual private network appliance to gain access to the trusted management part of the KA-SAT network. The attackers then issued commands to overwrite part of the flash memory in modems, making them unable to access the network, but not permanently damaged. The satellite itself and its ground infrastructure were not directly affected.<\/p>\n<h2>About Viasat<\/h2>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/Viasat-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2470\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/Viasat-logo-300x119.jpg\" alt=\"\" width=\"300\" height=\"119\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/Viasat-logo-300x119.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/Viasat-logo.jpg 635w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Viasat is an American communications company based in Carlsbad, California, with additional operations across the United States and worldwide. Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets<\/p>\n<h2>Which framework using ?<\/h2>\n<p>The first question is which framework to use to do this analysis ? At this time, there are 5 frameworks and methodologies that can be used for the space sector :<\/p>\n<ul>\n<li><strong>MITRE ATT&amp;CK<\/strong> is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. You can learn more about MITRE AT&amp;CK in our article <a href=\"https:\/\/www.spacesecurity.info\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/\">here<\/a>.<\/li>\n<li><strong>SPARTA<\/strong> is the Aerospace Corporation\u2019s Space Attack Research and Tactic Analysis. SPARTA is an ATT&amp;CK\u00ae like knowledge-base framework but for Space Missions. SPARTA matrix is intended to provide unclassified information to space professionals about how spacecraft may be compromised due to adversarial actions across the attack lifecycle. You can learn more about SPARTA in our article <a href=\"https:\/\/www.spacesecurity.info\/aerospace-corporation-released-sparta-v1-3-a-new-version-of-the-space-attack-research-and-tactic-analysis-sparta-matrix\/\">here<\/a>.<\/li>\n<li><strong>SPACE-SHIELD<\/strong> is the Space Attacks and Countermeasures Engineering Shield from ESA. SPACE-SHIELD is an ATT&amp;CK\u00ae like knowledge-base framework for Space Systems. It is a collection of adversary tactics and techniques, and a security tool applicable in the Space environment to strengthen the security level. The matrix covers the Space Segment and communication links, and it does not address specific types of mission. You can learn more about SPACE-SHIELD in our article <a href=\"https:\/\/www.spacesecurity.info\/esa-released-the-space-shield-an-attck-like-knowledge-base-framework-for-space-systems\/\">here<\/a>.<\/li>\n<li><strong>TREKS<\/strong> is the Targeting, Reconnaissance, &amp; Exploitation Kill-Chain for Space Vehicles Cybersecurity Framework. TREKS is a new Cybersecurity Framework that highlights the unique kill chain for the space vehicle. It\u2019s a Cybersecurity Framework released by Dr. Jacob Oakley after more than five years spent researching and working on space system cybersecurity. You can learn more about TREKS in our article <a href=\"https:\/\/www.spacesecurity.info\/treks-targeting-reconnaissance-exploitation-kill-chain-for-space-vehicles-a-new-cybersecurity-framework-that-highlights-the-unique-kill-chain-for-the-space-vehicle\/\">here<\/a>.<\/li>\n<li><strong>SpaDoCs<\/strong>, or the Space Domain Cybersecurity Framework, is a comprehensive and systematic model designed to address cybersecurity challenges in the space domain. Developed to bridge the gap between space and cyber domains, SpaDoCs aims to enhance collaboration and information sharing across mission, company, international, and government boundaries.\u00a0You can learn more about SpaDoCs in our article <a href=\"https:\/\/www.spacesecurity.info\/space-domain-cybersecurity-framework-also-known-as-spadocs\/\">here<\/a>.<\/li>\n<\/ul>\n<p>I did a quick comparaison in <a href=\"https:\/\/www.spacesecurity.info\/a-comparaison-of-recently-released-cybersecurity-frameworks-for-space-sector\/\">this article<\/a>, of all the released Cybersecurity Frameworks for Space Sector<\/p>\n<p>SPARTA is a framework but for spacecraft and space missions. SPARTA doesn&#8217;t cover ground segment.\u00a0The entire Viasat attack took place on Earth, on a ground-based network and on a conventional information system. So, there is no reason to use SPARTA, SPACE-SHIELD or TREKS. MITRE ATT&amp;CK is a great framework, well suited for this analysis. To be more precise, we used the <a href=\"http:\/\/Enterprise Matrix\">MITRE ATT&amp;CK &#8211; Enterprise Matrix<\/a>.<\/p>\n<h2>Quick overview and comparaison between MITRE ATT&amp;CK and the Cyber Kill Chain<\/h2>\n<p><strong>What is the Cyber Kill Chain?<\/strong><\/p>\n<p><em>&#8220;The cyber security kill chain model explains the typical procedure that hackers take when performing a successful cyber attack. It is a framework developed by Lockheed Martin derived from military attack models and transposed over to the digital world to help teams understand, detect, and prevent persistent cyber threats. While not all cyber attacks will utilize all seven steps of the cyber security kill chain model, the vast majority of attacks use most of them, often spanning Step 2 to Step 6.&#8221;<\/em> (source : <a href=\"https:\/\/www.netskope.com\/security-defined\/cyber-security-kill-chain\">netskope.com<\/a>)<\/p>\n<p><strong>What is in the MITRE ATT&amp;CK Matrix?<\/strong><\/p>\n<p><em>&#8220;The MITRE ATT&amp;CK matrix contains a set of techniques used by adversaries to accomplish a specific objective. Those objectives are categorized as tactics in the ATT&amp;CK Matrix. The objectives are presented linearly from the point of reconnaissance to the final goal of exfiltration or impact.&#8221;<\/em> (source : <a href=\"https:\/\/www.trellix.com\/en-us\/security-awareness\/cybersecurity\/what-is-mitre-attack-framework.html#:~:text=The%20MITRE%20ATT%26CK%20matrix%20contains,of%20exfiltration%20or%20%22impact%22.\">trellix.com<\/a>)<\/p>\n<p><strong>Comparaison between the Cyber Kill Chain and the MITRE ATT&amp;CK matrix<\/strong><\/p>\n<p>The table below compares the stages of the Cyber Kill Chain with those of the MITRE ATT&amp;CK matrix<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 390px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; text-align: center; height: 26px;\"><strong>Cyber Kill Chain<\/strong><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\"><strong>MITRE ATT&amp;CK<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Reconnaissance<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Reconnaissance<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Weaponization<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Resource Development<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Delivery<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Initial Access<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Exploitation<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Execution<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Installation<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Persistence<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Command and Control (C2)<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Privilege Escalation<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\">Actions on objectives<\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Defense Evasion<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Credential Access<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Discovery<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Lateral Movement<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Collection<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Command and Control (C2)<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Exfiltration<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px; text-align: center;\"><\/td>\n<td style=\"width: 50%; text-align: center; height: 26px;\">Impact<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Mapping the Viasat hack with TTPs<\/h2>\n<p>To do this work, we mainly used 3 articles, documents or papers detailed below :<\/p>\n<ul>\n<li>[1] <a href=\"https:\/\/www.researchgate.net\/publication\/363558808_Space_Cybersecurity_Lessons_Learned_from_The_ViaSat_Cyberattack\">Space Cybersecurity Lessons Learned from The ViaSat Cyberattack<\/a> from Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University)<\/li>\n<li>[2] <a href=\"https:\/\/news.viasat.com\/blog\/corporate\/ka-sat-network-cyber-attack-overview\">KA-SAT Network cyber attack overview<\/a> by Viasat<\/li>\n<li>[3] <a href=\"https:\/\/www.sentinelone.com\/labs\/acidrain-a-modem-wiper-rains-down-on-europe\/\">AcidRain | A Modem Wiper Rains Down on Europe<\/a> by SentineOne Team<\/li>\n<\/ul>\n<p><strong>Best Practices for MITRE ATT&amp;CK Mapping<\/strong><\/p>\n<p>MITRE ATT&amp;CK is often used to identify and analyze adversary behavior.\u00a0CISA (Cybersecurity and Infrastructure Security Agency) released a guidance to help analysts accurately and consistently map adversary behaviors to the relevant ATT&amp;CK techniques as part of cyber threat intelligence (CTI)\u2014whether the analyst wishes to incorporate ATT&amp;CK into a cybersecurity publication or an analysis of raw data.<\/p>\n<p>We used these best Practices for MITRE ATT&amp;CK\u00ae Mapping that you can find here :<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2023-01\/Best%20Practices%20for%20MITRE%20ATTCK%20Mapping.pdf\">Best Practices for Mapping to MITRE ATT&amp;CK (cisa.gov)<\/a><\/p>\n<p><strong>Mapping the Viasat hack with TTPs<\/strong><\/p>\n<p>Through open-source intelligence, the team [1] composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University) reconstructed the lifecycle of the attack.<\/p>\n<p>They specified that &#8220;<em>however, without first-hand knowledge of ViaSat\u2019s systems, we cannot be certain about our hypothesis<\/em>&#8220;.<\/p>\n<p>They schematized the entire attack life cycle in the diagram below (from document [1])<\/p>\n<figure id=\"attachment_2439\" aria-describedby=\"caption-attachment-2439\" style=\"width: 818px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2439 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle.jpg\" alt=\"\" width=\"818\" height=\"854\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle.jpg 818w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle-287x300.jpg 287w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle-768x802.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/09\/Viasat-Attack-Life-cycle-696x727.jpg 696w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/a><figcaption id=\"caption-attachment-2439\" class=\"wp-caption-text\">The anatomy of the ViaSat attack broken into seven levels of escalation. Source : Nicol\u00f2 Boschetti (Cornell University) and Gregory Falco (Cornell University) &#8211; 2022<\/figcaption><\/figure>\n<p>We will use this diagram to identify TTPs used by attackers at each steps of the attack<\/p>\n<p><strong>Phase 1 : IP address and credentials reconnaissance<\/strong><\/p>\n<p>[1] &#8220;<em>In 2021, Fortinet disclosed an attack on their VPN \u201cFortigate&#8221; that exploited a vulnerability discovered in 2019 (editor&#8217;s note: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-13379\">CVE-2018-13379<\/a>). The allegedly Russian hacker group Groove stole and published credentials of almost 500,000 IP addresses in the same year.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"3\">Reconnaissance<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1595\/002\/\">T1595.002<\/a>] Active Scanning: Vulnerability Scanning<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1593\/\">T1593<\/a>] Search Open Websites\/Domains<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1589\/001\/\">T1589.001<\/a>] Gather Victim Identity Information: Credentials<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"2\">Resource Development<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1650\/\">T1650<\/a>] Acquire Access<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1586\/\">T1586<\/a>] Compromise Accounts<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 2 : Use internet to access IP addresses of the Earth Gateway Centers<\/strong><\/p>\n<p>[1] &#8220;<em>ViaSat has shared that the initial attacker intrusion point was via the internet. Skylogic\u2019s control servers, the Gateway Earth Stations, and the Surfbeam2 modems rely on VPN appliances produced by the company Fortinet as indicated by the security researcher Ruben Santamarta.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 50%;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"2\">Initial Access<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1190\/\">T1190<\/a>] Exploit Public-Facing Application<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1133\/\">T1133<\/a>] External Remote Services<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 3 : Exploit VPN vulnerability to pass through the DMZ<\/strong><\/p>\n<p>[2] &#8220;<em>Subsequent investigation and forensic analysis identified a ground-based network intrusion by an attacker exploiting a misconfiguration in a VPN appliance to gain remote access to the trusted management segment of the KA-SAT network<\/em>.&#8221;<\/p>\n<p>[1] &#8220;<em>It is known that Fortinet released a patch to address the <\/em><em>vulnerability, but it is unclear if ViaSat\u2019s operator, Skylogic, ever deployed the patch. Therefore, we can surmise that the attacker used the unpatched VPN to access Skylogic\u2019s Gateway Earth Stations or POP server from the open internet.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 253px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 67px; vertical-align: top;\">Initial Access<\/td>\n<td style=\"width: 50%; height: 67px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1078\/\">T1078<\/a>] Valid Accounts<\/td>\n<\/tr>\n<tr style=\"height: 93px;\">\n<td style=\"width: 50%; height: 93px; vertical-align: top;\">Privilege Escalation<\/td>\n<td style=\"width: 50%; height: 93px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1068\/\">T1068<\/a>] Exploitation for Privilege Escalation<\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 67px; vertical-align: top;\">Defense Evasion<\/td>\n<td style=\"width: 50%; height: 67px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/004\/\">T1562.004<\/a>] Impair Defenses: Disable or Modify System Firewall<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 4 : Move laterally<\/strong><\/p>\n<p>[2] &#8220;<em>The attacker moved laterally through this trusted management network to a specific network segment used to manage and operate the network<\/em>&#8221; of modems.<\/p>\n<p>[1] &#8220;<em>This access, or privilege escalation, allowed the attacker to pass the DMZ and access the bent-pipe satellite intranet (the trusted management network) tunneling their way to the Surfbeam2 modem. This process is confirmed by ViaSat\u2019s statement<\/em>&#8221;<\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"2\">Discovery<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1049\/\">T1049<\/a>] System Network Connections Discovery<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\/\">T1082<\/a>] System Information Discovery<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"2\">Lateral Movement<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\">T1021<\/a>] Remote Services<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1570\/\">T1570<\/a>] Lateral Tool Transfer<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 5 : Select specific beam spots<\/strong><\/p>\n<p>[1] &#8220;<em>Not all ViaSat modems were targeted. This can be explained by an operator\u2019s capability at the Gateway Earth Stations to select which of KA-SAT\u2019s 82 geographic cells receive signal. This implies that the attacker specified which geographic cells (and their respective modems) would receive the signal with the malicious commands.<\/em>&#8221;<\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%; vertical-align: top;\" rowspan=\"2\">Discovery<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\/\">T1016<\/a>] System Network Configuration Discovery<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\/\">T1082<\/a>] System Information Discovery<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 6 : Send signal to the modems<\/strong><\/p>\n<p>[2] &#8220;<em>and then used this network access to execute legitimate, targeted management commands on a large number of residential modems simultaneously<\/em>.&#8221;<\/p>\n<p>[1] &#8220;<em>The attacker specified which geographic cells (and their respective modems) would receive the signal with the malicious commands.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Execution<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/\">T1059<\/a>] Command and Scripting Interpreter<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 7 : Exploit VPN vulnerability to access modem&#8217;s management interface<\/strong><\/p>\n<p>[1] &#8220;<em>Once at the modem, the attacker again escalated privilege using the unpatched VPN, enabling their manipulation of the modem\u2019s management.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Defense Evasion<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/004\/\">T1562.004<\/a>] Impair Defenses: Disable or Modify System Firewall<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Initial Access<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1133\/\">T1133<\/a>] External Remote Services<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Privilege Escalation<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1068\/\">T1068<\/a>] Exploitation for Privilege Escalation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 8 : Upload wiper malware<\/strong><\/p>\n<p>[2] &#8220;<em>Specifically, these destructive commands overwrote key data in flash memory on the modems, rendering the modems unable to access the network, but not permanently unusable<\/em>.&#8221;<\/p>\n<p>[1] &#8220;<em>The modem likely had limited or no firmware authentication requirements, therefore the attacker was able to provide a \u2018valid\u2019 firmware update, installing an ELF binary dubbed \u201cAcidRain&#8221; which deleted data from the modem\u2019s flash memory.&#8221;<\/em><\/p>\n<p>[3] <em>&#8220;The threat actor used the KA-SAT management mechanism in a supply-chain attack to push a wiper designed for modems and routers,&#8221; <\/em><\/p>\n<p><em>[3] &#8220;In a statement disseminated to journalists, Viasat confirmed the use of the AcidRain wiper in the February 24th attack against their modems.&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Resource Development<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1588\/002\/\">T1588.002<\/a>] Obtain Capabilities: Tool<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Execution<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1072\/\">T1072<\/a>] Software Deployment Tools<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Initial Access<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1195\/\">T1195<\/a>] Supply Chain Compromise<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Defense Evasion<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1070\/004\/\">T1070.004<\/a>] Indicator Removal: File Deletion<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Persistence<\/td>\n<td style=\"width: 50%;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1542\/001\/\">T1542.001<\/a>] Pre-OS Boot: System Firmware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Phase 9 : Impact<\/strong><\/p>\n<p>[2] <em>&#8220;Ultimately, tens of thousands of modems that were previously online and active dropped off the network, and these modems were not observed attempting to re-enter the network. The attack impacted a majority of the previously active modems within Ukraine, and a substantial number of additional modems in other parts of Europe.&#8221;<\/em><\/p>\n<p>[2] <em>&#8220;Specifically, these destructive commands overwrote key data in flash memory on the modems, rendering the modems unable to access the network, but not permanently unusable.&#8221;<\/em><\/p>\n<p>[1] <em>&#8220;We hypothesize that the attack\u2019s spillover effects in Germany and other European states are due to either an error when selecting the geographic cells that received the malicious signal, or simply the selection of cells that contained Ukrainian territory with overlap of other EU countries&#8221;<\/em><\/p>\n<p>At this phase, we identified the following TTPs :<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 383px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 67px;\" rowspan=\"9\">Impact<\/td>\n<td style=\"width: 50%; height: 67px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1529\/\">T1529<\/a>] System Shutdown\/Reboot<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1485\/\">T1485<\/a>] Data Destruction<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1495\/\">T1495<\/a>] Firmware Corruption<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/\">T1561<\/a>] Disk Wipe<\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/001\/\">T1561.001<\/a>] Disk Wipe: Disk Content Wipe<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/002\/\">T1561.002<\/a>] Disk Structure Wipe<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1531\/\">T1531<\/a>] Account Access Removal<\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 67px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1498\/\">T1498<\/a>] Network Denial of Service<\/td>\n<\/tr>\n<tr style=\"height: 67px;\">\n<td style=\"width: 50%; height: 67px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1489\/\">T1489<\/a>] Service Stop<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Summary of MITRE ATT&amp;CK TTPs observed in the Viasat cyber attack<\/h2>\n<p>The following table presents all TTPs that have been used by the hackers during the Viasat attack.<\/p>\n<table style=\"border-collapse: collapse; width: 100%; height: 2041px;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\"><strong>Tactic<\/strong><\/td>\n<td style=\"width: 33.3333%; height: 26px;\"><strong>Technique<\/strong><\/td>\n<td style=\"width: 33.3333%; height: 26px;\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 145px;\">\n<td style=\"width: 33.3333%; height: 435px; vertical-align: top;\" rowspan=\"3\">Reconnaissance<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1595\/002\/\">T1595.002<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">Active Scanning: Vulnerability Scanning<\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 33.3333%; height: 119px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1593\/\">T1593<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 119px;\">Search Open Websites\/Domains<\/td>\n<\/tr>\n<tr style=\"height: 171px;\">\n<td style=\"width: 33.3333%; height: 171px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1589\/001\/\">T1589.001<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 171px;\">Gather Victim Identity Information: Credentials<\/td>\n<\/tr>\n<tr style=\"height: 93px;\">\n<td style=\"width: 33.3333%; height: 238px; vertical-align: top;\" rowspan=\"3\">Resource Development<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1650\/\">T1650<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">Acquire Access<\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 33.3333%; height: 119px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1586\/\">T1586<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 119px;\">Compromise Accounts<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1588\/002\/\">T1588.002<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Obtain Capabilities: Tool<\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 33.3333%; height: 331px; vertical-align: top;\" rowspan=\"4\">Initial Access<\/td>\n<td style=\"width: 33.3333%; height: 119px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1190\/\">T1190<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 119px;\">Exploit Public-Facing Application<\/td>\n<\/tr>\n<tr style=\"height: 93px;\">\n<td style=\"width: 33.3333%; height: 93px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1133\/\">T1133<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">External Remote Services<\/td>\n<\/tr>\n<tr style=\"height: 93px;\">\n<td style=\"width: 33.3333%; height: 93px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1078\/\">T1078<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">Valid Accounts<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1195\/\">T1195<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Supply Chain Compromise<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 52px; vertical-align: top;\" rowspan=\"2\">Execution<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/\">T1059<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Command and Scripting Interpreter<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1072\/\">T1072<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Software Deployment Tools<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px; vertical-align: top;\">Persistence<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1542\/001\/\">T1542.001<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Pre-OS Boot: System Firmware<\/td>\n<\/tr>\n<tr style=\"height: 145px;\">\n<td style=\"width: 33.3333%; height: 145px; vertical-align: top;\">Privilege Escalation<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1068\/\">T1068<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">Exploitation for Privilege Escalation<\/td>\n<\/tr>\n<tr style=\"height: 145px;\">\n<td style=\"width: 33.3333%; height: 171px; vertical-align: top;\" rowspan=\"2\">Defense Evasion<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1562\/004\/\">T1562.004<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">Impair Defenses: Disable or Modify System Firewall<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1070\/004\/\">T1070.004<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Indicator Removal: File Deletion<\/td>\n<\/tr>\n<tr style=\"height: 145px;\">\n<td style=\"width: 33.3333%; height: 264px; vertical-align: top;\" rowspan=\"2\">Discovery<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1049\/\">T1049<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 145px;\">System Network Connections Discovery<\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 33.3333%; height: 119px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1082\/\">T1082<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 119px;\">System Information Discovery<\/td>\n<\/tr>\n<tr style=\"height: 93px;\">\n<td style=\"width: 33.3333%; height: 119px; vertical-align: top;\" rowspan=\"2\">Lateral Movement<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\">T1021<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 93px;\">Remote Services<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1570\/\">T1570<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Lateral Tool Transfer<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 234px; vertical-align: top;\" rowspan=\"9\">Impact<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1529\/\">T1529<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">System Shutdown\/Reboot<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1485\/\">T1485<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Data Destruction<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1495\/\">T1495<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Firmware Corruption<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/\">T1561<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Disk Wipe<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/001\/\">T1561.001<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Disk Wipe: Disk Content Wipe<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1561\/002\/\">T1561.002<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Disk Structure Wipe<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1531\/\">T1531<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Account Access Removal<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1498\/\">T1498<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Network Denial of Service<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 33.3333%; height: 26px;\">[<a href=\"https:\/\/attack.mitre.org\/techniques\/T1489\/\">T1489<\/a>]<\/td>\n<td style=\"width: 33.3333%; height: 26px;\">Service Stop<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The following table presents all TTPs mapped on \u00a0the ATT&amp;CK Navigator in order to have the complete attack chain as a cyber kill chain.<\/p>\n<figure id=\"attachment_2459\" aria-describedby=\"caption-attachment-2459\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2459 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1024x435.jpg\" alt=\"\" width=\"696\" height=\"296\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1024x435.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-300x128.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-768x327.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1536x653.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-696x296.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack-1068x454.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg 1879w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2459\" class=\"wp-caption-text\">Table showing all TTPs mapped on \u00a0the ATT&amp;CK Navigator<\/figcaption><\/figure>\n<p>You can download the Excel version <a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/viasat-attack\/layer.xlsx\">here<\/a>.<\/p>\n<p>You can also download the JSON file <a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/viasat-attack\/layer.json\">here<\/a> and open it with the ATT&amp;CK Navigator with the option &#8220;Open Existing Layer&#8221; and &#8220;Upload from local&#8221;<\/p>\n<p>The following diagram presents all TTPs mapped on the entire attack life cycle of the Viasat cyber attack. This diagram is inspired from the schema of the entire attack life cycle done by\u00a0the team [1] composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University).<\/p>\n<figure id=\"attachment_2467\" aria-describedby=\"caption-attachment-2467\" style=\"width: 921px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2467 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme.jpg\" alt=\"\" width=\"921\" height=\"756\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme.jpg 921w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme-300x246.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme-768x630.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/viasat-diagramme-696x571.jpg 696w\" sizes=\"auto, (max-width: 921px) 100vw, 921px\" \/><\/a><figcaption id=\"caption-attachment-2467\" class=\"wp-caption-text\">Diagram showing all TTPs mapped on the entire attack life cycle of the Viasat cyber attack<\/figcaption><\/figure>\n<h2>Viasat Cyber Attack modeled with the MITRE Attack Flow Builder<\/h2>\n<p>Using all results of this work, I utilized the Attack Flow Builder to deconstruct the Viasat cyber attack, meticulously tracing each stage of the intrusion.<\/p>\n<p>By systematically documenting the initial access vector, tracking lateral movement within the network, and visualizing the execution of the malicious firmware update, I created a detailed forensic map of the attack\u2019s progression.<\/p>\n<p>The full article about this work can be found <a href=\"https:\/\/www.spacesecurity.info\/how-i-modeled-the-viasat-cyber-attack-to-leverage-attack-flow-builder-from-mitre-for-enhanced-threat-understanding\/\">here<\/a>.<\/p>\n<figure id=\"attachment_3062\" aria-describedby=\"caption-attachment-3062\" style=\"width: 400px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3062 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-400x1024.jpg\" alt=\"\" width=\"400\" height=\"1024\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-400x1024.jpg 400w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-117x300.jpg 117w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-768x1965.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-600x1536.jpg 600w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-800x2048.jpg 800w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-696x1781.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-1068x2733.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/01\/Viasat-Attack-Flow-scaled.jpg 1000w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><figcaption id=\"caption-attachment-3062\" class=\"wp-caption-text\">Viasat Attack Threat Modeling with the MITRE Attack Flow Builder<\/figcaption><\/figure>\n<h2>List of remaining work<\/h2>\n<p>Following this study, there is still a great deal of work to be done. See below for a list of topics still to be dealt with. If any of you are interested, please contact me <a href=\"https:\/\/www.spacesecurity.info\/en\/contact\/\">here<\/a>.<\/p>\n<ul>\n<li>Describing sequences of adversary behaviors in the <a href=\"https:\/\/mitre-engenuity.org\/cybersecurity\/center-for-threat-informed-defense\/our-work\/attack-flow\/\">Attack flow data model<\/a><\/li>\n<li>Trying to highlight the vulnerabilities exploited by the attackers<\/li>\n<li>Trying\u00a0 to propose countermeasures that could be used to mitigate the attack. Mitigation chapter for each techniques in the MITRE ATT&amp;CK framework can be used<\/li>\n<li>Trying to map countermeasures on the <a href=\"https:\/\/d3fend.mitre.org\/\">MITRE D3FEND\u2122 Matrix\u00a0<\/a><\/li>\n<\/ul>\n<h2>Main References<\/h2>\n<ul>\n<li>[1] <a href=\"https:\/\/www.researchgate.net\/publication\/363558808_Space_Cybersecurity_Lessons_Learned_from_The_ViaSat_Cyberattack\">Space Cybersecurity Lessons Learned from The ViaSat Cyberattack<\/a> from Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University)<\/li>\n<li>[2] <a href=\"https:\/\/news.viasat.com\/blog\/corporate\/ka-sat-network-cyber-attack-overview\">KA-SAT Network cyber attack overview<\/a> by Viasat<\/li>\n<li>[3] <a href=\"https:\/\/www.sentinelone.com\/labs\/acidrain-a-modem-wiper-rains-down-on-europe\/\">AcidRain | A Modem Wiper Rains Down on Europe<\/a> by SentineOne Team<\/li>\n<\/ul>\n<h2>Others References<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.fox-it.com\/media\/iwwbk555\/ti-alert-russia-ukraine-060422.pdf\">Threat Intelligence Alert: Russia\/Ukraine Conflict<\/a> by NCCGroup<\/li>\n<li><a href=\"https:\/\/www.splunk.com\/en_us\/blog\/security\/threat-update-acidrain-wiper.html\">Threat Update: AcidRain Wiper<\/a> by Splunk<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-054a\">New Sandworm Malware Cyclops Blink Replaces VPNFilter<\/a> by CISA<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/03\/mystery-solved-in-destructive-attack-that-knocked-out-10k-viasat-modems\/\">Mystery solved in destructive attack that knocked out &gt;10k Viasat modems<\/a> by Arstechnica<\/li>\n<li><a href=\"https:\/\/www.reversemode.com\/2022\/03\/viasat-incident-from-speculation-to.html\">VIASAT incident: from speculation to technical details<\/a> by Reversemode<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/threat-signal-report\/4484\/acidrain-wiper-suspected-in-satellite-broadband-outage-in-europe\">AcidRain Wiper Suspected in Satellite Broadband Outage in Europe<\/a> by Fortiguard<\/li>\n<li><a href=\"https:\/\/media.defense.gov\/2022\/May\/10\/2002993519\/-1\/-1\/0\/CSA_PROTECTING_VSAT_COMMUNICATIONS_05102022.PDF\"> NSA | Protecting VSAT Communications<\/a> via NSA<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/AA22-076_Strengthening_Cybersecurity_of_SATCOM_Network_Providers_and_Customers.pdf\">Strengthening Cybersecurity of SATCOM Network Providers and Customers<\/a> by CISA<\/li>\n<li><a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/ukraine-wiper-malware-russia\">Ukraine: Disk-wiping Attacks Precede Russian Invasion<\/a> by Symantec<\/li>\n<li><a href=\"https:\/\/www.optiv.com\/insights\/discover\/blog\/russiaukraine-update-november-2022\">Russia\/Ukraine Update &#8211; November 2022<\/a> by Optiv<\/li>\n<li><a href=\"https:\/\/bo-cyberthreat.thalesgroup.com\/sites\/default\/files\/2022-11\/THALES%20THREAT%20HANDBOOK%202022.pdf\">Cyber Threat Handbook 2022<\/a> by Thales<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/the-increasing-wiper-malware-threat\">An Overview of the Increasing Wiper Malware Threat<\/a> by Fortinet<\/li>\n<li><a href=\"https:\/\/arxiv.org\/pdf\/2309.04878.pdf\">Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study<\/a> by Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, and Shouhuai Xu &#8211; Department of Computer Science &#8211; University of Colorado Colorado Springs<\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/wiper-malware-purposes-mitre-techniques-attackers-v%C3%B6gele\/\">Wiper Malware: Purposes, MITRE Techniques, and Attacker&#8217;s Trade-Offs<\/a> by Julian-Ferdinand V\u00f6gele (Threat Research @ Recorded Future)<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2023-01\/Best Practices for MITRE ATTCK Mapping.pdf\">Best Practices for MITRE ATT&amp;CK\u00ae Mapping<\/a> by CISA<\/li>\n<li><a href=\"https:\/\/youtu.be\/qI_ICtX3Gm8?si=yraxgbB6rp2TgTb2\">Video Youtube : DEF CON 31 &#8211; Defending KA-SAT<\/a> by Mark Colaluca and Nick Saunders<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=RdjthhBylMk\">Youtube Video : Black Hat USA 2023 &#8211; Lessons Learned from the KA-SAT Cyberattack: Response, Mitigation and Information Sharing<\/a> by Mark Colaluca , Craig Miller , Nick Saunders , Michael Sutton , Kristina Walter<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University). In their open-source intelligence, they reconstructed the lifecycle of the attack. They specified that however, without first-hand knowledge of ViaSat\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,21,22,26,28,19],"tags":[],"class_list":{"0":"post-2474","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-europe-en","9":"category-hacking-en","10":"category-russia-en","11":"category-satellite-en","12":"category-united-states"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An analysis of the Viasat cyber attack with the MITRE ATT&amp;CK\u00ae framework - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An analysis of the Viasat cyber attack with the MITRE ATT&amp;CK\u00ae framework - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University). In their open-source intelligence, they reconstructed the lifecycle of the attack. They specified that however, without first-hand knowledge of ViaSat\u2019s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T14:49:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-13T15:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1879\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"An analysis of the Viasat cyber attack with the MITRE ATT&#038;CK\u00ae framework\",\"datePublished\":\"2023-10-10T14:49:39+00:00\",\"dateModified\":\"2025-01-13T15:52:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/\"},\"wordCount\":3252,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/MITRE-ATTCK-viasat-attack.jpg\",\"articleSection\":[\"Cyber\",\"Europe\",\"Hacking\",\"Russia\",\"Satellite\",\"United-States\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/\",\"name\":\"An analysis of the Viasat cyber attack with the MITRE ATT&CK\u00ae framework - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/MITRE-ATTCK-viasat-attack.jpg\",\"datePublished\":\"2023-10-10T14:49:39+00:00\",\"dateModified\":\"2025-01-13T15:52:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/MITRE-ATTCK-viasat-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/MITRE-ATTCK-viasat-attack.jpg\",\"width\":1879,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An analysis of the Viasat cyber attack with the MITRE ATT&#038;CK\u00ae framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An analysis of the Viasat cyber attack with the MITRE ATT&CK\u00ae framework - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/","og_locale":"en_US","og_type":"article","og_title":"An analysis of the Viasat cyber attack with the MITRE ATT&CK\u00ae framework - Space &amp; Cybersecurity Info","og_description":"Disclaimer To do this analysis of the Viasat cyber attack, I used the open-source intelligence (1) of the team composed by Nicol\u00f2 Boschetti (Cornell University), Nathaniel Gordon (Johns Hopkins University) and Gregory Falco (Cornell University). In their open-source intelligence, they reconstructed the lifecycle of the attack. They specified that however, without first-hand knowledge of ViaSat\u2019s [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2023-10-10T14:49:39+00:00","article_modified_time":"2025-01-13T15:52:42+00:00","og_image":[{"width":1879,"height":799,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"An analysis of the Viasat cyber attack with the MITRE ATT&#038;CK\u00ae framework","datePublished":"2023-10-10T14:49:39+00:00","dateModified":"2025-01-13T15:52:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/"},"wordCount":3252,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg","articleSection":["Cyber","Europe","Hacking","Russia","Satellite","United-States"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/","url":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/","name":"An analysis of the Viasat cyber attack with the MITRE ATT&CK\u00ae framework - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg","datePublished":"2023-10-10T14:49:39+00:00","dateModified":"2025-01-13T15:52:42+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/10\/MITRE-ATTCK-viasat-attack.jpg","width":1879,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-viasat-cyber-attack-with-the-mitre-attck-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"An analysis of the Viasat cyber attack with the MITRE ATT&#038;CK\u00ae framework"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2474"}],"version-history":[{"count":14,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2474\/revisions"}],"predecessor-version":[{"id":3073,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2474\/revisions\/3073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2460"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}