| ID | Name |
|---|---|
| T1695.001 | Serial COM |
| T1695.002 | Ethernet |
| T1695.003 | Wi-Fi |
Adversaries may block access to Ethernet communications to prevent instructions or configurations messages from reaching target systems and devices. Ethernet connections allow for communications between IT and OT systems and devices. Blocking Ethernet communications may also block command and reporting messages.[1]
An adversary may block Ethernet communications by disabling network interfaces, Service Stop, or conducting an Adversary-in-the-Middle attack and dropping the network traffic.
| ID | Name | Description |
|---|---|---|
| S0372 | LockerGoga |
LockerGoga had blocked network communications by disabling all the network interfaces on the system via netsh.exe.[2][3][4] |
| ID | Mitigation | Description |
|---|---|---|
| M0807 | Network Allowlists |
Implement network allowlists to minimize network access to only authorized hosts. |
| M0930 | Network Segmentation |
Segment operational networks to isolate critical systems and devices that do not require broad network access. |
| M0810 | Out-of-Band Communications Channel |
Ensure systems and devices have an alternative method for communicating in the event that Ethernet communication channels become unavailable. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0911 | Detection of Block Ethernet | AN2054 |
Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist, alarms may still be visible even if Ethernet messages are blocked. Monitor for a loss of network communications, which may indicate this technique is being used. Monitor for lack of operational process data which may help identify a loss of communications. This will not directly detect the technique’s execution but instead may provide additional evidence that the technique has been used and may complement other detections. Monitor application logs for changes to settings and other events associated with network protocols that may be used to block communications. Monitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications. |