Supply chain attack

This type of attack aims to inflict damage upon an organization by leveraging vulnerabilities in its supply network. Cybercriminals often manipulate hardware or software during the manufacturing stage to implant rootkits or tie in hardware-based spying elements. Attackers can later use these implants to attack the organization they’re after.