{
	"id": "72a07ffa-dc7f-4225-adc6-56bbf7d2988a",
	"created_at": "2026-04-06T02:11:53.951108Z",
	"updated_at": "2026-04-10T03:20:45.693859Z",
	"deleted_at": null,
	"sha1_hash": "5da81e1253718a3ea660001b1d95bf2fbb3900eb",
	"title": "SPC-15 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41486,
	"plain_text": "SPC-15 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 02:09:27 UTC\r\nMobile Threat Catalogue\r\nUnsecured or Malicious 3rd Party Components\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-15\r\nThreat Description: Unsecured, potentially malicious 3rd party components of a technology or code-base can be\r\npackaged with a product before shipment to an acquirer.\r\n1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html"
	],
	"report_names": [
		"SPC-15.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775441513,
	"ts_updated_at": 1775791245,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5da81e1253718a3ea660001b1d95bf2fbb3900eb.pdf",
		"text": "https://archive.orkl.eu/5da81e1253718a3ea660001b1d95bf2fbb3900eb.txt",
		"img": "https://archive.orkl.eu/5da81e1253718a3ea660001b1d95bf2fbb3900eb.jpg"
	}
}