Detection of Supply Chain Compromise

Technique Detected:  Supply Chain Compromise | T1474

ID: DET0628
Domains: Mobile
Analytics: AN1697, AN1698
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1697

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None

AN1698

Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.

Log Sources
Data Component Name Channel
API Calls (DC0112) Application Vetting None