Supply Chain Compromise: Compromise Hardware Supply Chain

An attacker can replace an hardware component in the supply chain with a custom or counterfeit part, to damage the system or to use it as a future backdoor. An attacker can also induce the intentional use of a not genuine HW component to reduce the system reliability. [1]

ID: T1195.003
Sub-technique of:  T1195
Tactic: Initial Access
Platforms: None
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References