Repair processes are exploited to extract, modify, or destroy
information. Examples include computer repair shops copying information and
reselling it and maintenance people introducing computer viruses.
Complexity: This attack requires involvement in the repair process and is
normally not directed at a particular victim from its inception but rather
directed toward an audience (market segment). There is little complexity
involved in carrying out the attack once the position as a repair provider is
established.
fc@red.a.net