Esc
Compromise Software Supply Chain - T1195.002
(ATT&CK® Technique)
Definition
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.