Tactic: Disturbance

Technique: Software Power Off Or Reset

Disabling the target robot is less dangerous than the attacker having total control over the robot, but can be an effective technique depending on the context nonetheless. Powering off the robot usually requires access to the operating system running on the robot itself. Using a simple "poweroff" command (or equivalent) is often enough, as this command is often not locked behind higher permissions. If it is, the attacker must first gain higher access through some form of privilege escalation.

Mitigations

Limiting the users who can initiate the shutdown protocol on the robot greatly reduces the attack surface. Ensuring that users with higher permissions can power off the robot will fully mitigate this attack, given that there is no privilege escalation exploit present.

Detections

The robot itself powering off is fairly obvious. One could have a health check service that pings the robot periodically to see if it is still available, and if not, it may have been powered off.

Ethical Considerations

Just as when physically powering off a robot, doing it via a software method can create a dangerous situation or do damage to it's surroundings. One should be aware of the consequences to the environment or others when a robot is turned of abruptly and when necessary take precautions.

Documented incidents with autonomous robots

During a pentest on the Jackal robot from Clear Path Robotics, admin access was granted by inputting default credentials through SSH. With admin permissions, the linux command "poweroff" was initiated, and the robot shut itself down. This also is the case with the Unitree as shown below.