Supply Chain Compromise

TID
ATE-023

Products, software, and workflows are initially infected or counterfeited. They are manipulated before reaching the end consumer and are then utilized to gain access to control systems. The ultimate objective is to compromise data or systems once infected products enter the target environment.

Type
Technique
Severity of Impact
Critical
Severity of Feasibility
High
Scalability
Highly
Domain
Automotive
Rail
Origin
Mitre