Dark Mode
Capec-628 Detail
Carry-Off GPS Attack
Detailed Communications Likelihood: Low Typical Severity: High
Parents: 627
Threats: T62
A common form of a GPS spoofing attack, commonly termed a carry-off attack begins with an adversary broadcasting signals synchronized with the genuine signals observed by the target receiver. The power of the counterfeit signals is then gradually increased and drawn away from the genuine signals. Over time, the adversary can carry the target away from their intended destination and toward a location chosen by the adversary.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-628 | capec | https://capec.mitre.org/data/definitions/628.html | |
| REF-489 | reference_from_CAPEC | https://en.wikipedia.org/wiki/Spoofing_attack#GPS_Spoofing | Wikipedia, The Wikimedia Foundation, Inc |
Not present
- The target must be relying on valid GPS signal to perform critical operations.
Not present
| High |
|---|
| This attack requires advanced knoweldge in GPS technology. |
Not present
- A "proof-of-concept" attack was successfully performed in June, 2013, when the luxury yacht "White Rose" was misdirected with spoofed GPS signals from Monaco to the island of Rhodes by a group of aerospace engineering students from the Cockrell School of Engineering at the University of Texas in Austin. The students were aboard the yacht, allowing their spoofing equipment to gradually overpower the signal strengths of the actual GPS constellation satellites, altering the course of the yacht.