Tactic: Persistence
Technique: OS Specific
Each operating system has their own set of standards and protocols that define how system startup should behave. These OS specific methods can be leveraged to implement persistence of malware and/or backdoors for the attacker to install and consistently apply.
Technique in practice
Video: persistence mechanisms
Mitigations
Startup mechanisms should be restricted to user accounts with higher privileges.
Detections
Virusscanners can often detect the installation of malicious payloads and malware.
Documented incidents with autonomous robots
No incidents known at the time of writing.