Data Stream Hijacking

medium

stream-hijacking

Attacker intercepts or manipulates real-time data streams to inject false data or steal information

TamperingInformation DisclosureSpoofing

MITRE ATT&CK techniques

IDNameTactic
T1557 Adversary-in-the-Middle Credential Access
T1565 Data Manipulation Impact

Common Weakness Enumeration

Mitigating controls

ctrl-stream-1
Encrypt data streams in transit using TLS
ctrl-stream-2
Implement producer authentication and authorization
ctrl-stream-3
Use message signing for integrity verification
ctrl-stream-4
Monitor stream throughput and patterns for anomalies
ctrl-stream-5
Secure checkpoint and offset storage to prevent consumer position manipulation
ctrl-stream-6
Implement consumer group isolation to prevent unauthorized consumers from joining

References