Supply-Chain Compromise
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
Metadata
- Severity: high
- Slug: supply-chain-compromise
MITRE
- T1565.001: Data Manipulation: Stored Data Manipulation
- T1573.002: Encrypted Channel: Asymmetric Cryptography
- T1195.002: Supply Chain Compromise: Compromise Software Supply Chain
- T1059.004: Command and Scripting Interpreter: Unix Shell