Compromise Software Supply Chain - T1474.003 (9558a84e-2d5e-4872-918e-d847494a8ffc)
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Compromise Software Supply Chain - T1474.003 (9558a84e-2d5e-4872-918e-d847494a8ffc) | Attack Pattern | Supply Chain Compromise - T1474 (0d95940f-9583-4e0f-824c-a42c1be47fad) | Attack Pattern | 1 |