The importance of being aware of supply chain attacks  

It’s easy for organisations to fall into the trap of focusing on defending their IT networks with virus scanning for potentially harmful files or stringent password rules, oblivious that the enemy may have made its way in through a trusted source. These kinds of attacks are called supply chain attacks. They sneakily enter an organisation’s IT systems through their supply chain without being noticed until it’s too late. 

Cyber-attacks like supply chain attacks and ransomware attacks can severely hurt a business. Some businesses never recover. 

What is a supply chain attack? 

Malicious actors have slyly found a vulnerability in the supply chain of IT systems. All organisations use third-party software that hasn’t been developed in-house. This can be anything from word processing to inventory systems to virus scanners. It is essential software an organisation needs to deliver its products and services to its clients and customers.  

These software vendors are trusted by organisations and their software is placed on their application whitelist. A whitelist is a list of trusted applications that are given permission to run on an IT system. Organisations will run this trusted software without a second thought that it may have been tampered with.  

Threat actors have understood now that they do not need to waste their time trying to hack into government organisations or large companies that have strong security. To exploit such organisations and many, many more, with a single effort they will secretly find their way into third party vendor software. They know it will be easier to infiltrate their security in comparison to large organisations who are guarding a lot of sensitive information.  

Malicious actors will embed malicious code into a software application, or a software update, or even a security patch, of third-party vendor software. When their software is distributed to all their customers, malicious code is also distributed. This is called an attack vector. On all the IT systems that use this vendor software, a digital certificate will be granted, and the software will be provided with clearance to install.  

It could be weeks later, and the organisation may not notice the malicious code at all, but eventually the malicious actor will remotely activate the malicious code. What it will do depends on the objectives of its creator. 

It may distribute itself through the network. It may be a ransomware attack. It may email itself to all the email contacts in the organisation’s email list.  

This malicious code will have access to whatever digital assets and sensitive business information the vendor software has access to. But the important thing to note is that a supply chain attack will do this to all the software vendor’s clients simultaneously. So, it can create a lot of damage in one attack. This is why the European Union Agency for Cybersecurity this year predicted a four-fold increase in these types of attacks over the next year - it’s less effort for malicious actors to gain maximum effect.  

Supply-chain-attack_1

How foreign threats can invade using supply chain attacks  

To demonstrate just how catastrophic a supply chain attack can be, last year Russian attackers who work for Russia’s foreign intelligence agency, hacked their way into the software firm SolarWinds. Implanting malicious code into their project management tool Orion. With a client base of at least 18,000 networks, these cyber criminals were able to create an attack vector into US federal agencies including NASA, the State Department, the Department of Defense, and the Department of Justice.  

Similarly, China, which has strong control over its citizens, can very easily launch a supply chain attack. A lot of the world’s software originates from countries like China or other countries where the cost of developing software is low. But the flip side of this is the risk that low cost creates.  

Open-source code risks   

Most software today contains some sort of open-source code. Open-source code is source code that is packaged and used as a foundation for new software development. Most open-source code is free, and it allows software development to accelerate by eliminating the need to reinvent.  

Unfortunately, the security around open-source code is not as strong as it can be. Malicious actors exploit this vulnerability by trying to embed malicious code within open-source code. Or they might develop their own open-source code which may do something wonderful but, within it, malicious code may exist.

How to protect your business from supply chain attacks

The best way to protect your business from supply chain risk is to implement strong supply chain security by thoroughly investigating third party software vendors. 

A security expert will know what to look for when it comes to compliance with strict cyber security standards. Does the vendor use open-source code? Is there software developed overseas? These are the kinds of questions that can form part of a security checklist for each vendor.  

Only vendors that meet certain criteria should be allowed to run freely on your IT network. Application whitelisting and checking that permitted software is installed as it should be is another way third-party software can be checked for supply chain attacks - as too is multi-factor authentication. All software that has not been checked should not be allowed to run. Checks should be done regularly to ensure everything is up to date.  

 If you’d like to know more about the importance of risk management and how your business can be protected from supply chain attacks and other security vulnerabilities, talk to the security experts at Essential Tech today.  

Got Any Questions?

We listen and learn to understand your business challenges, so we can deliver effective solutions that meet your specific business needs. Speak with an expert now!

Request Quote

How Unified Communications Aids Business Continuity

  How Unified Communications Aids Business Continuity     Business disruptions can occur anytime. For this reason,... Read more

Why Cybersecurity Should be a Business Priority by Essential Tech Brisbane

  Why Cybersecurity Should be a Business Priority     At its core, cybersecurity is about risk.  How much risk is a... Read more

Three IT Challenges You Can Conquer with Co-Managed Services

  Three IT Challenges You Can Conquer with Co-Managed Services Co-managed services vary by provider, but may be the ideal solution if your... Read more

Best Practices for Efficient, Cost-Effective, and Productive Enterprises

  IT Services Best Practices for Efficient, Cost-Effective, and Productive Enterprises The emergence of new technology such as AI, big... Read more

How Your Business Can Benefit from a VoIP Phone System

  How Your Business Can Benefit from a VoIP Phone System If you still have an analog PBX connected to the phone company, you know how... Read more

Simple Ways You Can Keep Your Business Information Safe

  Simple Ways You Can Keep Your Business Information Safe From Loss Or Theft     As unfortunate as it is, it seems... Read more

Does the thought of lost data send chills down your spine?

  Does the thought of lost data send chills down your spine? Every organization has a common fear—loss of data. Data loss due to a... Read more

5 Ways Microsoft 365 E5 Can Help You Secure Your Business

  5 Ways Microsoft 365 E5 Can Help You Secure Your Business     You know about the importance of staying connected, especially... Read more

Why You Need to Move Your Business to the Cloud by Essential Tech Brisbane

  Why You Need to Move Your Business to the Cloud Managing your business with cloud services is no longer an option…it has become a... Read more

Choosing Between an MSP vs. Internal IT Department

 Choosing Between an MSP vs. Internal IT Department If you own a business, there’s a pretty good chance that you use some form of technology. And, as... Read more

Business Website: Don’t Set It and Forget It by Essential Tech Brisbane

Business Website: Don’t Set It and Forget It The Importance of Maintaining Your Website  Just having a website up and running is not... Read more

The Art of Asking the Right Questions Can Save You Money on IT

  The Art of Asking the Right Questions Can Save You Money on IT All small businesses face the same battle—cutting costs. It’s smart to... Read more

How Much Does it Cost your Business to Use Old Computers?

  How Much Does it Cost your Business to Use Old Computers? Reducing costs and improving employee productivity are some of the top... Read more

8 Reasons to Choose a Managed IT Service Provider

  8 Reasons to Choose a Managed IT Service Provider Managed IT services allow you to focus on growing your business, without the worries... Read more

Protecting Your Business from Cyber Threats by Essential Tech Brisbane

  Protecting Your Business from Cyber Threats     Once, businesses and corporations mainly faced threats from the... Read more

The Nine Steps of Every Successful Cloud Journey by Essential Tech Brisbane

  The Nine Steps of Every Successful Cloud Journey As business grows, your IT infrastructure must evolve to handle your increased... Read more

Top Tips for Protecting your Client’s Data by Essential Tech Brisbane

  Top Tips for Protecting your Client's Data With the Notifiable Data Breaches Scheme commencing on February 22nd, 2018, businesses across Australia... Read more

Top Tips to Protect your Business Data by Essential Tech Brisbane

  Top Tips to Protect your Business Data   The most critical issue facing businesses is cyber attacks and threats. Whether it comes... Read more

Top 10 IT Support Companies in Brisbane

Best IT Support Companies in Brisbane As IT and internet-enabled tech continue to grow, there is a need for businesses of all sizes to evolve or be left behind. For... Read more

Top 10 Managed IT Service provider in Brisbane

Best Managed IT Service provider in Brisbane Managed IT service providers are becoming the go-to IT solutions provider for small to medium scale businesses that may... Read more