Tactic: Lateral Movement

Technique: Through Subsystem

Autonomous robots often have many different components with different layers of software running on it. It is possible that an attacker gets access to one of those components, but ultimately wants to access another component instead. The attacker can attempt this by applying lateral movement through these components, aka "subsystems".

Technique in practice

Article: lateral movement

Mitigations

Keeping the OS and its software up-to-date eliminates known vulnerabilities which could normally be used to laterally move from one subsystem to another.

Detections

Automated software should periodically scan the software versions being used on the operating system. These versions can be cross-referenced with reputable CVE databases to check for vulnerabilities. Once such a vulnerability is detected, the owner of the robot should be notified.

Documented incidents with autonomous robots

The Unitree autonomous robot was infiltrated in its OS subsystem. Through lateral movement, the controller subsystem became accessible. A demonstration of this can be seen in the video below.

Documented incidents in other domains

    [2023] IcedID malware strikes again