Supply Chain Compromise (T1474)

View on ATT&CK

In Playbook

Associated Tactics

  • Initial Access

Initial Access (TA0027)

The adversary is trying to get into your device. The initial access tactic represents the vectors adversaries use to gain an initial foothold onto a mobile device.

View on ATT&CK

Procedure Examples

Description Source(s)
M. Grace et al. (2012, April 16-18). Unsafe exposure analysis of mobile in-app advertisements. Retrieved December 22, 2016. Grace-Advertisement
Ryan Welton. (2015, June 15). A Pattern for Remote Code Execution using Arbitrary File Writes and MultiDex Applications. Retrieved December 22, 2016. NowSecure-RemoteCode
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue
NIST Mobile Threat Catalogue