|T1474.001||Compromise Software Dependencies and Development Tools|
|T1474.002||Compromise Hardware Supply Chain|
|T1474.003||Compromise Software Supply Chain|
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications.
Integrity checking mechanisms can potentially detect unauthorized hardware modifications.