{
	"id": "be98db93-e4f1-4fa8-b4a1-7a39b0682eee",
	"created_at": "2026-04-06T02:12:57.061588Z",
	"updated_at": "2026-04-10T03:20:32.145522Z",
	"deleted_at": null,
	"sha1_hash": "7cb31c938e1caccf26e77246fbf4bed3689090b9",
	"title": "SPC-5 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41853,
	"plain_text": "SPC-5 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:56:56 UTC\r\nMobile Threat Catalogue\r\nMalware Embedded in Critical Component\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-5\r\nThreat Description: An adversary with access to hardware procurement, maintenance, or upgrade control can\r\nembed malware in a critical component.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nEnterprise\r\nObtain device measurements for comparison to normal ranges (e.g., temperature, timing, EM radiation, power\r\nconsumption) to detect anomalous behavior.\r\nTest hardware to verify it functions as expected (e.g. known inputs yield correct outputs) prior to placing or\r\nreplacing the device into the production environment\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html"
	],
	"report_names": [
		"SPC-5.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775441577,
	"ts_updated_at": 1775791232,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7cb31c938e1caccf26e77246fbf4bed3689090b9.pdf",
		"text": "https://archive.orkl.eu/7cb31c938e1caccf26e77246fbf4bed3689090b9.txt",
		"img": "https://archive.orkl.eu/7cb31c938e1caccf26e77246fbf4bed3689090b9.jpg"
	}
}