{
	"id": "d098e324-6178-49f3-8864-dd09d55b5818",
	"created_at": "2026-04-06T02:10:44.408273Z",
	"updated_at": "2026-04-10T03:22:04.499265Z",
	"deleted_at": null,
	"sha1_hash": "59e0a80b9b01430a82c222da945903173c542c76",
	"title": "SPC-6 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 42492,
	"plain_text": "SPC-6 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:54:13 UTC\r\nMobile Threat Catalogue\r\nImproperly Vetted or Untested Malicious Microelectronics\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-6\r\nThreat Description: An adversary with access to the hardware commodity procurement process can insert\r\nimproperly vetted or untested malicious critical microelectronics components into the system during\r\ndevelopment.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nEnterprise\r\nRequire that hardware components be tested for correct functionality and normal operation, and that the output of\r\nautomated testing processes be digitally signed by the component that performed the test, and that the results are\r\nverified prior to acceptance of the tested component into the next stage of procurement, development, or\r\ndeployment to reduce the likelihood an adversary can successfully introduce a malicious component that is not\r\ndetected prior to use in production\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html\r\nPage 1 of 2\n\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html"
	],
	"report_names": [
		"SPC-6.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775441444,
	"ts_updated_at": 1775791324,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/59e0a80b9b01430a82c222da945903173c542c76.pdf",
		"text": "https://archive.orkl.eu/59e0a80b9b01430a82c222da945903173c542c76.txt",
		"img": "https://archive.orkl.eu/59e0a80b9b01430a82c222da945903173c542c76.jpg"
	}
}