BLUF: Below is the definition, common examples, and countermeasures of compromised hardware. 

Definition: Any unauthorized access or manipulation of a physical component of a computer system. It could be as simple as adding weakness into key parts like computer boards, microchips and network devices. These changes can stay inactive on your device for however long until they need to be used or turned on to cause disruptions. Being that these compromises are physical, standard software updates or scans often won’t remove it.

Countermeasures: In order to reduce the rates of compromised hardware it is important to make sure that you have a secure supply chain, ensure that authentication factors are strong, have regular monitoring and surveillance systems, and then updates regarding secureness and integrity happening regularly.

  • Secure any network ports that are in a public place
  • Devices that are connected to the network should have strong password policy and acceptable use banners

Examples of Compromised Hardware:  A few examples of compromised hardware would be

Devices with spyware installed, tampered desktops and laptops, infected USB devices, malicious chips within network devices/motherboards, and much more. Attackers can gain access to hardware while it is in transit from suppliers and tamper with the devices and insert backdoors into the device that give the attacker access to the network once the device is connected.This is an advanced attack method that can be mitigated by strong vendor management practices. Attackers can also leave USBs infected with malware in a public place. Those drives will sit there until someone curious picks them up, if they decide to plug it in to a networked device then they would have infected the network with malware.

Conclusion: Compromised Hardware, which is unauthorized access or manipulation of a computer component,  is an easily exploited weakness to any computer system. Because of its ability to stay dormant and undetected on a device until used makes it extremely dangerous. By enforcing security and strengthening devices and or networks, the risk of compromised hardware is able to be reduced significantly.