Tactic: Impact

Technique: Software Factory Reset

An attacker can perform a software factory reset. Once all former traces of old code, files and programs have been wiped, combined with setting custom passwords for access, the attacker can ensure that the original owner of the robot does not have any means of accessing the robot anymore.

Technique in practice

Video: factory reset linux

Mitigations

A software factory reset should be locked behind higher user priviliges within the robot's OS.

Detections

A simple health check service could detect whether the robot is still accessible.

Documented incidents with autonomous robots

No incidents known at the time of writing.