Description
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
Sub-techniques
Specific variations of this technique
MOT1195.002Compromise Software Supply Chain
2G
3G
4G
5G-SA
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.
MOT1195.301Compromise Network Function Supply Chain
4G
5G-SA: Theoretical
Adversaries may compromise the supply chain of virtualized network functions (VNFs) or physical network functions (PNFs) to introduce backdoors or vulnerabilities.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Used
3G
Used
4G
Used
5G-SA
Not Applicable
5G-NSA
Not Applicable