CAPEC 537 Infiltration of Hardware Development Environment

Draft Detailed Low Risk
Severity High

Description

An adversary, leveraging the ability to manipulate components of primary support systems and tools within the development and production environments, inserts malicious software within the hardware and/or firmware development environment. The infiltration purpose is to alter developed hardware components in a system destined for deployment at the victim's organization, for the purpose of disruption or further compromise.

Mitigations

4

Consequences

Relationships

Related ATT&CK Techniques

1