Supply Chain Compromise

Products, software, and workflows are initially infected or counterfeited. They are manipulated before reaching the end consumer and are then utilized to gain access to control systems. The ultimate objective is to compromise data or systems once infected products enter the target environment.

Technique_ID
ATE-023
Severity of Impact
Critical
Severity of Feasibility
High
Scalability
Highly
Domain
Automotive
Rail