Software Supply Chain Attacks are Skyrocketing

Global supply chain issues continue to persist to the point that they are circumventing earlier predictions that they would begin easing by now. They are getting worse, not better, due in part to prolonged Covid-19 lockdowns in parts of China and Russia’s invasion of Ukraine, which cut off their exports.

This is no small thing given that Ukraine is a major global supplier of foodstuffs and the world’s leading source of neon, a gas needed for the lasers used in the chip-making process – and the last thing needed in the already supply-constrained semiconductor industry.

As significant as these supply chain issues are, yet another big one is now coming to the forefront – software-based supply chain attacks. These garner far less attention even though they distribute substantially more pain than other types of cyberattacks.

According to a study by Argon Security, an Israeli cybersecurity firm that specializes in protecting the integrity of the software supply chain, software supply chain attacks grew by more than 300 percent in 2021 in comparison to 2020. And another recent study of more than 400 IT executives and managers by Anchore Enterprise, a California-based developer of a security-centric software supply chain management platform, found that three in five companies last year were targeted by software supply chain attacks.

A supply chain attack, also known as a third-party attack, occurs when hackers infiltrate an organization’s system through an outside partner or provider with poor security practices and access to its systems and data. More suppliers and service providers are touching sensitive data than ever, dramatically expanding the attack surface of most enterprises in recent years. Any company that produces software or hardware for other organizations is a potential target of attackers.

Cybercriminals are increasingly targeting software supply chains because these attacks allow them to compromise hundreds or thousands of victims through a single breach, while simultaneously affording them extensive internal access in the systems. Any breach can be damaging, of course, but a supply chain attack often is far worse because it frequently has a higher level of access to the network. Hackers can also be harder to detect.

One major example of a software supply chain breach last summer involved Kaseya, a leading provider of IT and security management solutions for managed services providers (MSPs) and small and medium-sized businesses. Hackers found a flaw in the company’s remote management software, enabling them to spread ransomware through the company’s software update processes and ultimately to the end users of the product. Up to 1,500 business were impacted. Similar attacks have occurred through other widely used software products, such as those provided by SolarWinds and Microsoft Exchange.

The SolarWinds incident in December 2020, believed to be a nation-state attack on thousands of government and corporate networks, was typical in that most software supply chain assaults target companies as an inroad to more valuable targets. If successful, the backdoor of a huge enterprise network is opened wide and, frequently, an entire supply chain as well.

Because supply chain attacks break into vulnerable, often smaller companies as a means to break into much bigger organizations, the disheartening upshot is that a company’s security no longer depends solely on its own resilience.

It’s no surprise, then, that successful supply chain attacks are distressingly common. According to BlueVoyant, a New York-based cybersecurity company, more than 80 percent of sizable organizations have experienced a data breach in recent years as a result of security vulnerabilities in their supply chains. The penetration rate is as high as it is, concludes BlueVoyant research, because the average big company has, on average, more than 1,000 vendors in its supply ecosystem.

Another growing problem is a new type of software supply chain attack that infiltrates open-source software, which, historically, has contained numerous security vulnerabilities.

According to Sonatype, a software analytics company that evaluates the security of corporate codebases, the number of such attacks exploded more than six-fold in 2021. (Some good news here is that the increasing number of such attacks may decline this year as software developers work harder to update and better protect their open-source software components.)

To help mitigate these and other software supply chain issues, organizations should stop using security technology that relies on hallmarks of previously encountered threats to try to stop the next attack. This approach leaves companies open to attacks that use new infrastructure and new techniques with as-yet unknown signatures.

Minimizing the risk of a software supply chain attack also requires a never-ending loop of risk and compliance management. Some attacks may still get through, but fewer – and that’s a step in the right direction. To this end, here are some tips.

+ Know your software. Keep a thorough inventory of all open source and proprietary off-the-shelf tools used by your organization. You can’t protect what you don’t know you have.

+ Ask prospective vendors for compliance verifications. This then requires your team to verify the existence and proper functioning of all required security processes and controls used by the vendor to protect their equipment, data and systems. Also ask your vendor to walk you through each step in their supply chain to maintain the required level of security throughout the supply chain journey.

+ Keep an eye out for known vulnerabilities and apply the appropriate software patches. This is crucial because hackers use automated tools to constantly scan millions of connected devices that haven’t applied patches against vulnerabilities. New updates respond to new threats.

+ Use access controls and two-factor authentication to heighten security. Also run security software with multiple layers of protection.

Lastly, users’ right of access to data should be limited to the minimum level necessary and the efficient use of various technologies should be checked regularly. Too many companies use multiple tools to manage the same things. They don’t appreciate that the greater the sprawl, the faster security controls collide and decay.

.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Making Safety and Security Intrinsic to School Design

    Public anxieties about school safety are escalating across the country. According to a 2023 Gallup report, 44% of parents fear for their child’s physical safety at school, a 10 percentage-point increase since 2019. Unfortunately, these fears are likely to increase if the incidence of school tragedies continues to mount. As a result, school leaders are now charged with two non-negotiable responsibilities. The first, as always, is to ensure kids have what they need to learn, grow, and thrive. Sadly, their second responsibility is to keep the children in their care safe from threats and physical danger. Read Now

  • The Power of a Layered Approach to Safety

    In a perfect world, every school would have an unlimited budget to help secure their schools. In reality, schools must prioritize what budget they have while navigating the complexities surrounding school security and lockdown. Read Now

  • How a Security System Can Enhance Arena Safety and the Fan Experience

    Ensuring guests have both a memorable experience and a safe one is no small feat for your physical security team. Stadiums, ballparks, arenas, and other large event venues are increasingly leveraging new technologies to transform the fan experience and maintain a high level of security. The goal is to preserve the integrity and excitement of the event while enhancing security and remaining “behind the scenes.” Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3