Tactic: Disturbance

Technique: Replay Controller Traffic

A replay attack occurs when a cyber criminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resend it to misdirect the receiver into doing what the hacker wants. The added danger of replay attacks is that a hacker doesn't even need advanced skills to decrypt a message after capturing it from the network. The attack could be successful simply by resending the whole thing.

Technique in practice

Video: Demo of a Replay attack
Video: Replay attack on a car

Mitigations

Mitigating such an attack can be done by using "keys" in each message. This key should only be valid for one message. With these keys, replaying an attack would cause the key to be incorrect the second time the message is send.

Another preventive technique is using timestamps on messages. This can limit the time the attacker has to eavesdrop, change the message and send it.

Detections

Detection can be done by constantly scanning for messages that are the exactly the same.
The best way however is using one of the mitigations above, timestamps are the easiest as you can clearly see the stamps with the same or maybe even a way later time.

Documented incidents with autonomous robots

No incidents known at the time of writing.

Documented incidents in other domains

    List to all Replay attacks in CVE database - This ranges from industrial control solutions to cars