ID | Name |
---|---|
T2014.001 | Hardcoded credentials and/or keys |
T2014.002 | Integration of custom malicious hardware |
T2014.003 | OBSW modification |
T2014.004 | Transponder reconfiguration |
T2014.005 | Payload modification |
An attacker can change the transponder configuration to permit a future radio access on the resource. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.