Software Supply Chain Attacks are Skyrocketing

Global supply chain issues continue to persist to the point that they are circumventing earlier predictions that they would begin easing by now. They are getting worse, not better, due in part to prolonged Covid-19 lockdowns in parts of China and Russia’s invasion of Ukraine, which cut off their exports.

This is no small thing given that Ukraine is a major global supplier of foodstuffs and the world’s leading source of neon, a gas needed for the lasers used in the chip-making process – and the last thing needed in the already supply-constrained semiconductor industry.

As significant as these supply chain issues are, yet another big one is now coming to the forefront – software-based supply chain attacks. These garner far less attention even though they distribute substantially more pain than other types of cyberattacks.

According to a study by Argon Security, an Israeli cybersecurity firm that specializes in protecting the integrity of the software supply chain, software supply chain attacks grew by more than 300 percent in 2021 in comparison to 2020. And another recent study of more than 400 IT executives and managers by Anchore Enterprise, a California-based developer of a security-centric software supply chain management platform, found that three in five companies last year were targeted by software supply chain attacks.

A supply chain attack, also known as a third-party attack, occurs when hackers infiltrate an organization’s system through an outside partner or provider with poor security practices and access to its systems and data. More suppliers and service providers are touching sensitive data than ever, dramatically expanding the attack surface of most enterprises in recent years. Any company that produces software or hardware for other organizations is a potential target of attackers.

Cybercriminals are increasingly targeting software supply chains because these attacks allow them to compromise hundreds or thousands of victims through a single breach, while simultaneously affording them extensive internal access in the systems. Any breach can be damaging, of course, but a supply chain attack often is far worse because it frequently has a higher level of access to the network. Hackers can also be harder to detect.

One major example of a software supply chain breach last summer involved Kaseya, a leading provider of IT and security management solutions for managed services providers (MSPs) and small and medium-sized businesses. Hackers found a flaw in the company’s remote management software, enabling them to spread ransomware through the company’s software update processes and ultimately to the end users of the product. Up to 1,500 business were impacted. Similar attacks have occurred through other widely used software products, such as those provided by SolarWinds and Microsoft Exchange.

The SolarWinds incident in December 2020, believed to be a nation-state attack on thousands of government and corporate networks, was typical in that most software supply chain assaults target companies as an inroad to more valuable targets. If successful, the backdoor of a huge enterprise network is opened wide and, frequently, an entire supply chain as well.

Because supply chain attacks break into vulnerable, often smaller companies as a means to break into much bigger organizations, the disheartening upshot is that a company’s security no longer depends solely on its own resilience.

It’s no surprise, then, that successful supply chain attacks are distressingly common. According to BlueVoyant, a New York-based cybersecurity company, more than 80 percent of sizable organizations have experienced a data breach in recent years as a result of security vulnerabilities in their supply chains. The penetration rate is as high as it is, concludes BlueVoyant research, because the average big company has, on average, more than 1,000 vendors in its supply ecosystem.

Another growing problem is a new type of software supply chain attack that infiltrates open-source software, which, historically, has contained numerous security vulnerabilities.

According to Sonatype, a software analytics company that evaluates the security of corporate codebases, the number of such attacks exploded more than six-fold in 2021. (Some good news here is that the increasing number of such attacks may decline this year as software developers work harder to update and better protect their open-source software components.)

To help mitigate these and other software supply chain issues, organizations should stop using security technology that relies on hallmarks of previously encountered threats to try to stop the next attack. This approach leaves companies open to attacks that use new infrastructure and new techniques with as-yet unknown signatures.

Minimizing the risk of a software supply chain attack also requires a never-ending loop of risk and compliance management. Some attacks may still get through, but fewer – and that’s a step in the right direction. To this end, here are some tips.

+ Know your software. Keep a thorough inventory of all open source and proprietary off-the-shelf tools used by your organization. You can’t protect what you don’t know you have.

+ Ask prospective vendors for compliance verifications. This then requires your team to verify the existence and proper functioning of all required security processes and controls used by the vendor to protect their equipment, data and systems. Also ask your vendor to walk you through each step in their supply chain to maintain the required level of security throughout the supply chain journey.

+ Keep an eye out for known vulnerabilities and apply the appropriate software patches. This is crucial because hackers use automated tools to constantly scan millions of connected devices that haven’t applied patches against vulnerabilities. New updates respond to new threats.

+ Use access controls and two-factor authentication to heighten security. Also run security software with multiple layers of protection.

Lastly, users’ right of access to data should be limited to the minimum level necessary and the efficient use of various technologies should be checked regularly. Too many companies use multiple tools to manage the same things. They don’t appreciate that the greater the sprawl, the faster security controls collide and decay.

.
  • The Z-Wave Alliance Focuses on the Residential Market The Z-Wave Alliance Focuses on the Residential Market

    Mitchell Klein serves as the executive director of the Z-Wave Alliance, an industry organization that drives numerous initiatives to expand and accelerate the global adoption of smart home and smart cities applications. In this Podcast, we talk about the 2022 State of the Ecosystem, and the fact that technology has brought about almost unimaginable residential security resources. The Alliance also provides education resources as well as looking at expanding technology.

Digital Edition

  • Security Today Magazine - May June 2022

    May / June 2022

    Featuring:

    • The Ying and Yang of Security
    • Installing Smart Systems
    • Leveraging Surveillance
    • Using Mobile Data
    • RIP Covid-19

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety