Compromise Hardware Supply Chain - T1195.003 (39131305-9282-45e4-ac3b-591d2d4fc3ef)
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Supply Chain Compromise - T1195 (3f18edba-28f4-4bb9-82c3-8aa60dcac5f7) | Attack Pattern | Compromise Hardware Supply Chain - T1195.003 (39131305-9282-45e4-ac3b-591d2d4fc3ef) | Attack Pattern | 1 |