An adversary uses their privileged position within an authorized development organization to inject malicious logic into a codebase or product.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
2