Skip to content

DET0628 Detection of Supply Chain Compromise

Item Value
ID DET0628
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1474 (Supply Chain Compromise)

Analytics

Android

AN1697

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None
Mutable Elements
Field Description

iOS

AN1698

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None
Mutable Elements
Field Description