Backdoor Installation: Integration of custom malicious hardware

Replacement of a product in the supply chain with a custom or counterfeit part to damage the system or to use it as a future backdoor. [1]

ID: T2014.002
Sub-technique of:  T2014
Tactic: Persistence
Platforms: None
Version: 2.0
Created: 25 August 2022
Last Modified: 21 April 2023

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References