ID | Name |
---|---|
T1195.001 | Compromise Software Dependencies and Development Tools |
T1195.002 | Compromise Software Supply Chain |
T1195.003 | Compromise Hardware Supply Chain |
An attacker can replace an hardware component in the supply chain with a custom or counterfeit part, to damage the system or to use it as a future backdoor. An attacker can also induce the intentional use of a not genuine HW component to reduce the system reliability. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.