Supply Chain Compromise
TID
ATE-023
Products, software, and workflows are initially infected or counterfeited. They are manipulated before reaching the end consumer and are then utilized to gain access to control systems. The ultimate objective is to compromise data or systems once infected products enter the target environment.
Tactic
Type
Technique
Severity of Impact
Critical
Severity of Feasibility
High
Scalability
Highly
Domain
Automotive
Rail
Origin
Mitre