| ID | Name |
|---|---|
| T2014.001 | Hardcoded credentials and/or keys |
| T2014.002 | Integration of custom malicious hardware |
| T2014.003 | OBSW modification |
| T2014.004 | Transponder reconfiguration |
| T2014.005 | Payload modification |
An attacker can also modify the payload hardware, software or configuration to create a future access on the payload itself, either to target it or to use it against the whole resource. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.