{
	"id": "34a816a1-69b1-4f02-9c4f-0864e47f8a96",
	"created_at": "2026-04-06T00:13:15.959004Z",
	"updated_at": "2026-04-10T13:11:46.572065Z",
	"deleted_at": null,
	"sha1_hash": "91d67882ab669fc5142e6520ae1b8bd3eaf21ddd",
	"title": "SPC-16 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 35453,
	"plain_text": "SPC-16 · Mobile Threat Catalogue\r\nArchived: 2026-04-05 12:48:06 UTC\r\nMobile Threat Catalogue\r\nObsolete Hardware Replacement\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-16\r\nThreat Description: A gray market adversary can exploit an obsolescence program to introduce replacement\r\nhardware with malware incorporated.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nCVE Examples\r\nPossible Countermeasures\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html"
	],
	"report_names": [
		"SPC-16.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434395,
	"ts_updated_at": 1775826706,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/91d67882ab669fc5142e6520ae1b8bd3eaf21ddd.pdf",
		"text": "https://archive.orkl.eu/91d67882ab669fc5142e6520ae1b8bd3eaf21ddd.txt",
		"img": "https://archive.orkl.eu/91d67882ab669fc5142e6520ae1b8bd3eaf21ddd.jpg"
	}
}