T1195.003 - Compromise Hardware Supply Chain

Sub-technique
Tactics:
Initial Access
Platforms:
Linux macOS Windows
Detection:
Not specified
Description:
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.
Metadata
MITRE ID: T1195.003
STIX ID: attack-pattern--39131305-9282-...
Platforms: Linux, macOS, Windows
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00