Backdoor Installation: Payload modification

An attacker can also modify the payload hardware, software or configuration to create a future access on the payload itself, either to target it or to use it against the whole resource. [1]

ID: T2014.005
Sub-technique of:  T2014
Tactic: Persistence
Platforms: Ground Segment, Space Segment, Space-link communication
Version: 2.0
Created: 23 September 2022
Last Modified: 21 April 2023


This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.