Tactic: Impact
Technique: Software Factory Reset
An attacker can perform a software factory reset. Once all former traces of old code, files and programs have been wiped, combined with setting custom passwords for access, the attacker can ensure that the original owner of the robot does not have any means of accessing the robot anymore.
Technique in practice
Video: factory reset linux
Mitigations
A software factory reset should be locked behind higher user priviliges within the robot's OS.
Detections
A simple health check service could detect whether the robot is still accessible.
Documented incidents with autonomous robots
No incidents known at the time of writing.