Home > CAPEC List > CAPEC-534: Malicious Hardware Update (Version 2.9)  

CAPEC-534: Malicious Hardware Update

 
Malicious Hardware Update
Definition in a New Window Definition in a New Window
Attack Pattern ID: 534
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker introduces malicious hardware during an update or replacement procedure, allowing for additional compromise or site disruption at the victim location.

+ Typical Severity

High

+ Typical Likelihood of Exploit

Likelihood: Low

The nature of these type of attacks involve a coordinated effort between well-funded multiple attackers, and sometimes require physical access to successfully complete an attack. As a result these types of attacks are not launched on a large scale against any potential victim, but are typically highly targeted against victims who are often targeted and may have rather sophisticated cyber defenses already in place.

+ Examples-Instances

Description

An attacker develops a malicious networking card that allows for normal function plus the addition of malicious functionality that is of benefit to the attacker. The attacker sends the victim an email stating that the existing networking card is faulty, and that the victim can order a replacement card free of charge. The victim orders the card, and the attacker sends the malicious networking card. The malicious networking card replaces the perfectly-functioning original networking card, and the attacker is able to take advantage of the additional malicious functionality to further compromise the victim's network.

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: High

Able to develop and manufacture malicious hardware components that perform the same functions and processes as their non-malicious counterparts.

+ References
[R.534.1] [REF-50] John F. Miller. "Supply Chain Attack Framework and Attack Patterns". The MITRE Corporation. 2013. <http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf>.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Attack_Prerequisites, Description Summary, Typical_Likelihood_of_ExploitInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015