ID | Name |
---|---|
T2014.001 | Hardcoded credentials and/or keys |
T2014.002 | Integration of custom malicious hardware |
T2014.003 | OBSW modification |
T2014.004 | Transponder reconfiguration |
T2014.005 | Payload modification |
The attacker can hardcode credentials during the supply chain phase with custom, to have a secure access to the resource if the component is integrated in the system. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.