T1219.003 - Remote Access Hardware

Sub-technique
Tactics:
Command and Control
Platforms:
Linux macOS Windows
Detection:
Not specified
Description:
An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target systems within networks. These services, including IP-based keyboard, video, or mouse (KVM) devices such as TinyPilot and PiKVM, are commonly used as legitimate tools and may be allowed by peripheral device policies within a target environment.

Remote access hardware may be physically installed and used post-compromise as an alternate communications channel for redundant access or as a way to establish an interactive remote session with the target system. Using hardware-based remote access tools may allow threat actors to bypass software security solutions and gain more control over the compromised device(s).(Citation: Palo Alto Unit 42 North Korean IT Workers 2024)(Citation: Google Cloud Threat Intelligence DPRK IT Workers 2024)
Metadata
MITRE ID: T1219.003
STIX ID: attack-pattern--a9fb6b3f-4a3c-...
Platforms: Linux, macOS, Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00