Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Mobile
  4. Supply Chain Compromise
  5. Compromise Hardware Supply Chain

Supply Chain Compromise: Compromise Hardware Supply Chain

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.

ID: T1474.002
Sub-technique of: T1474
Tactic Type: Post-Adversary Device Access
Platforms: Android, iOS
Version: 1.1
Created: 28 March 2022
Last Modified: 24 October 2025

Mitigations

IDMitigationDescription
M1001 Security Updates

Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0604Detection of Compromise Hardware Supply ChainAN1653

Integrity checking mechanisms can potentially detect unauthorized hardware modifications.

AN1654

Integrity checking mechanisms can potentially detect unauthorized hardware modifications.

×

[8]ページ先頭

©2009-2026 Movatter.jp