Skip to content

T1474.002 Compromise Hardware Supply Chain

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.

Item Value
ID T1474.002
Sub-techniques T1474.001, T1474.002, T1474.003
Tactics TA0027
Platforms Android, iOS
Version 1.1
Created 28 March 2022
Last Modified 20 March 2023


ID Mitigation Description
M1001 Security Updates Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications.


ID Data Source Data Component
DS0013 Sensor Health Host Status