{
	"id": "47130755-65fc-4a19-ba38-ccce9ebc0b2a",
	"created_at": "2026-04-06T00:20:17.623223Z",
	"updated_at": "2026-04-10T13:12:47.115476Z",
	"deleted_at": null,
	"sha1_hash": "3422ce49dd523a45d37f343a9d73c79a676590a1",
	"title": "SPC-17 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 35545,
	"plain_text": "SPC-17 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 20:27:23 UTC\r\nMobile Threat Catalogue\r\nMalicious Hardware or Firmware Inserted During Integration\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-17\r\nThreat Description: An adversary with access to critical components as they are being integrated into the\r\nacquired system can insert maliciously altered hardware or firmware into the system.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nCVE Examples\r\nPossible Countermeasures\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html"
	],
	"report_names": [
		"SPC-17.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434817,
	"ts_updated_at": 1775826767,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3422ce49dd523a45d37f343a9d73c79a676590a1.pdf",
		"text": "https://archive.orkl.eu/3422ce49dd523a45d37f343a9d73c79a676590a1.txt",
		"img": "https://archive.orkl.eu/3422ce49dd523a45d37f343a9d73c79a676590a1.jpg"
	}
}