MITRE ATT&CK Technique
Initial Access T1195.003
Description

Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.

Supported Platforms
Linux macOS Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-03-11T14:28:40.064Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may manipulate hardware components in products '
                'prior to receipt by a final consumer for the purpose of data '
                'or system compromise. By modifying hardware or firmware in '
                'the supply chain, adversaries can insert a backdoor into '
                'consumer networks that may be difficult to detect and give '
                'the adversary a high degree of control over the system. '
                'Hardware backdoors may be inserted into various devices, such '
                'as servers, workstations, network infrastructure, or '
                'peripherals.',
 'external_references': [{'external_id': 'T1195.003',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1195/003'}],
 'id': 'attack-pattern--39131305-9282-45e4-ac3b-591d2d4fc3ef',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'initial-access'}],
 'modified': '2025-10-24T17:48:39.693Z',
 'name': 'Compromise Hardware Supply Chain',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Linux', 'macOS', 'Windows'],
 'x_mitre_version': '1.1'}
Quick Actions