An adversary obtains decommissioned, recycled, or discarded systems and devices that can include an organization’s intellectual property, employee data, and other types of controlled information. Systems and devices that have reached the end of their lifecycles may be subject to recycle or disposal where they can be exposed to adversarial attempts to retrieve information from internal memory chips and storage devices that are part of the system.
Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 116 | Excavation |
CanFollow | D | 406 | Dumpster Diving |
CanPrecede | D | 37 | Retrieve Embedded Sensitive Data |
An adversary may need the ability to mount printed circuit boards and target individual chips for exploitation.
An adversary needs the technical skills required to extract solid state drives, hard disk drives, and other storage media to host on a compatible system or harness to gain access to digital content.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Accountability | N/A | Bypass Protection Mechanism | N/A |
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1052 | Exfiltration Over Physical Medium |