{
	"id": "dd8ee6a0-8e9e-4af2-8ee2-9409f590c9e3",
	"created_at": "2026-04-06T03:37:40.560186Z",
	"updated_at": "2026-04-10T13:12:08.421998Z",
	"deleted_at": null,
	"sha1_hash": "9c430dbfb1d7278afa740a52e3b1bb0bf0293f03",
	"title": "SPC-2 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 41438,
	"plain_text": "SPC-2 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 03:11:02 UTC\r\nMobile Threat Catalogue\r\nMalicious Critical Hardware Replacement\r\nContribute\r\nThreat Category: Supply Chain\r\nID: SPC-2\r\nThreat Description: Adversarial supply chain distribution channel personnel (e.g., packaging, shipping,\r\nreceiving, or transfer) can intercept and replace legitimate critical hardware components with malicious ones.1\r\nThreat Origin\r\nSupply Chain Attack Framework and Attack Patterns 1\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nEnterprise\r\nPerform background checks on supply chain personnel as appropriate to the level of sensitivity of the component\r\nbeing distributed to detect placement or the potential for or actual manipulation by an adversary\r\nReferences\r\n1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013;\r\nwww.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf ↩ ↩2\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html"
	],
	"report_names": [
		"SPC-2.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775446660,
	"ts_updated_at": 1775826728,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/9c430dbfb1d7278afa740a52e3b1bb0bf0293f03.pdf",
		"text": "https://archive.orkl.eu/9c430dbfb1d7278afa740a52e3b1bb0bf0293f03.txt",
		"img": "https://archive.orkl.eu/9c430dbfb1d7278afa740a52e3b1bb0bf0293f03.jpg"
	}
}