MITRE ATT&CK Technique
Description
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images (removable media infected at the factory)(Citation: IBM Storwize)(Citation: Schneider Electric USB Malware) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, adversaries looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels.(Citation: Avast CCleaner3 2018)(Citation: Microsoft Dofoil 2018)(Citation: Command Five SK 2011) Adversaries may limit targeting to a desired victim set or distribute malicious software to a broad set of consumers but only follow up with specific victims.(Citation: Symantec Elderwood Sept 2012)(Citation: Avast CCleaner3 2018)(Citation: Command Five SK 2011) Popular open-source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise) In some cases, adversaries may conduct “second-order” supply chain compromises by leveraging the access gained from an initial supply chain compromise to further compromise a software component.(Citation: Krebs 3cx overview 2023) This may allow the threat actor to spread to even more victims.
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2018-04-18T17:59:24.739Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Adversaries may manipulate products or product delivery '
'mechanisms prior to receipt by a final consumer for the '
'purpose of data or system compromise.\n'
'\n'
'Supply chain compromise can take place at any stage of the '
'supply chain including:\n'
'\n'
'* Manipulation of development tools\n'
'* Manipulation of a development environment\n'
'* Manipulation of source code repositories (public or '
'private)\n'
'* Manipulation of source code in open-source dependencies\n'
'* Manipulation of software update/distribution mechanisms\n'
'* Compromised/infected system images (removable media '
'infected at the factory)(Citation: IBM Storwize)(Citation: '
'Schneider Electric USB Malware) \n'
'* Replacement of legitimate software with modified versions\n'
'* Sales of modified/counterfeit products to legitimate '
'distributors\n'
'* Shipment interdiction\n'
'\n'
'While supply chain compromise can impact any component of '
'hardware or software, adversaries looking to gain execution '
'have often focused on malicious additions to legitimate '
'software in software distribution or update '
'channels.(Citation: Avast CCleaner3 2018)(Citation: Microsoft '
'Dofoil 2018)(Citation: Command Five SK 2011) Adversaries may '
'limit targeting to a desired victim set or distribute '
'malicious software to a broad set of consumers but only '
'follow up with specific victims.(Citation: Symantec Elderwood '
'Sept 2012)(Citation: Avast CCleaner3 2018)(Citation: Command '
'Five SK 2011) Popular open-source projects that are used as '
'dependencies in many applications may also be targeted as a '
'means to add malicious code to users of the '
'dependency.(Citation: Trendmicro NPM Compromise)\n'
'\n'
'In some cases, adversaries may conduct “second-order” supply '
'chain compromises by leveraging the access gained from an '
'initial supply chain compromise to further compromise a '
'software component.(Citation: Krebs 3cx overview 2023) This '
'may allow the threat actor to spread to even more victims. ',
'external_references': [{'external_id': 'T1195',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1195'},
{'description': 'Avast Threat Intelligence Team. '
'(2018, March 8). New investigations '
'into the CCleaner incident point to '
'a possible third stage that had '
'keylogger capacities. Retrieved '
'March 15, 2018.',
'source_name': 'Avast CCleaner3 2018',
'url': 'https://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities'},
{'description': 'Brian Krebs. (2023, April 20). 3CX '
'Breach Was a Double Supply Chain '
'Compromise. Retrieved May 22, 2025.',
'source_name': 'Krebs 3cx overview 2023',
'url': 'https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/'},
{'description': 'Command Five Pty Ltd. (2011, '
'September). SK Hack by an Advanced '
'Persistent Threat. Retrieved '
'November 17, 2024.',
'source_name': 'Command Five SK 2011',
'url': 'https://web.archive.org/web/20160309235002/https://www.commandfive.com/papers/C5_APT_SKHack.pdf'},
{'description': 'IBM Support. (2017, April 26). '
'Storwize USB Initialization Tool may '
'contain malicious code. Retrieved '
'May 28, 2019.',
'source_name': 'IBM Storwize',
'url': 'https://www-01.ibm.com/support/docview.wss?uid=ssg1S1010146&myns=s028&mynp=OCSTHGUJ&mynp=OCSTLM5A&mynp=OCSTLM6B&mynp=OCHW206&mync=E&cm_sp=s028-_-OCSTHGUJ-OCSTLM5A-OCSTLM6B-OCHW206-_-E'},
{'description': "O'Gorman, G., and McDonald, G.. "
'(2012, September 6). The Elderwood '
'Project. Retrieved November 17, '
'2024.',
'source_name': 'Symantec Elderwood Sept 2012',
'url': 'https://web.archive.org/web/20190717233006/http:/www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf'},
{'description': 'Schneider Electric. (2018, August '
'24). Security Notification – USB '
'Removable Media Provided With Conext '
'Combox and Conext Battery Monitor. '
'Retrieved May 28, 2019.',
'source_name': 'Schneider Electric USB Malware',
'url': 'https://www.se.com/us/en/download/document/SESN-2018-236-01/'},
{'description': 'Trendmicro. (2018, November 29). '
'Hacker Infects Node.js Package to '
'Steal from Bitcoin Wallets. '
'Retrieved April 10, 2019.',
'source_name': 'Trendmicro NPM Compromise',
'url': 'https://www.trendmicro.com/vinfo/dk/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal-from-bitcoin-wallets'},
{'description': 'Windows Defender Research. (2018, '
'March 7). Behavior monitoring '
'combined with machine learning '
'spoils a massive Dofoil coin mining '
'campaign. Retrieved March 20, 2018.',
'source_name': 'Microsoft Dofoil 2018',
'url': 'https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/'}],
'id': 'attack-pattern--3f18edba-28f4-4bb9-82c3-8aa60dcac5f7',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'initial-access'}],
'modified': '2025-10-24T17:48:41.675Z',
'name': 'Supply Chain Compromise',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.3.0',
'x_mitre_contributors': ['Veeral Patel',
'Menachem Goldstein',
'Damien Miller-McAndrews'],
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': False,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['Linux', 'Windows', 'macOS', 'SaaS'],
'x_mitre_version': '1.7'}