Hardware Additions
Adversaries may physically introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. [Replication Through Removable Media](https://attack.mitre.org/techniques/T1091)), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused. While public references of...
BY SOURCE
PROCEDURES (8)
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for evasion
Auto-extracted: 2 detections for registry
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for script execution monitoring