{
	"id": "bfd92f31-6b96-45c7-aee6-a5d03b8951f7",
	"created_at": "2026-04-06T00:18:59.016531Z",
	"updated_at": "2026-04-10T13:11:43.264229Z",
	"deleted_at": null,
	"sha1_hash": "19182d6c40528d775f4d83da6ba2113932d4cade",
	"title": "SPC-7 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41530,
	"plain_text": "SPC-7 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 21:45:29 UTC\r\nMobile Threat Catalogue\r\nHardware Component Substitution During Transfer\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-7\r\nThreat Description: An adversary with access to production component supplier shipping channels during\r\ntransfer of system components can substitute a maliciously altered hardware component for a tested and approved\r\ncomponent.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nEnterprise\r\nTest systems that contain newly integrated or updated components to detect incorrect function or anomalous\r\nbehavior prior to production use\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html"
	],
	"report_names": [
		"SPC-7.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434739,
	"ts_updated_at": 1775826703,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/19182d6c40528d775f4d83da6ba2113932d4cade.pdf",
		"text": "https://archive.orkl.eu/19182d6c40528d775f4d83da6ba2113932d4cade.txt",
		"img": "https://archive.orkl.eu/19182d6c40528d775f4d83da6ba2113932d4cade.jpg"
	}
}