Data Stream Hijacking
mediumstream-hijacking
Attacker intercepts or manipulates real-time data streams to inject false data or steal information
TamperingInformation DisclosureSpoofing
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1557 | Adversary-in-the-Middle | Credential Access |
| T1565 | Data Manipulation | Impact |
Common Weakness Enumeration
Mitigating controls
ctrl-stream-1- Encrypt data streams in transit using TLS
ctrl-stream-2- Implement producer authentication and authorization
ctrl-stream-3- Use message signing for integrity verification
ctrl-stream-4- Monitor stream throughput and patterns for anomalies
ctrl-stream-5- Secure checkpoint and offset storage to prevent consumer position manipulation
ctrl-stream-6- Implement consumer group isolation to prevent unauthorized consumers from joining