Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5 Steps To Supply Chain Security

The integrity of enterprise data is only as strong as your most vulnerable third-party supplier or business partner. It's time to shore up these connection points.

Download the entire
August 2014 issue of
Dark Reading Tech Digest
, distributed in an all-digital format (registration required).

One of the largest known breaches, resulting in 110 million records lost and hundreds of millions of dollars in damages, started with a small, third-party supplier. We're talking about Target, where attackers compromised Fazio Mechanical Services, a provider of heating, ventilation, and air conditioning services, to gain access to the retail giant's network. The breach lasted 19 days and contributed to a 46% drop in year-over-year quarterly profits for the company, according to Target's filings with the Securities and Exchange Commission. Nearly 100 lawsuits have been filed so far, and Target's then CEO, Gregg Steinhafel, and its CIO, Beth Jacobs, have resigned.

"The Target breach is a watershed moment in third-party attacks," says Stephen Boyer, CEO of BitSight, a security intelligence firm. "No one wants to be the next one."

The breach may be a watershed, but it's hardly unique. The August 2013 defacement of The New York Times occurred because attackers fooled the media organization's DNS provider into granting access to the account that determined how the Internet routed traffic to the Times' site. Lockheed Martin suffered an attack through a flaw in RSA's SecurID system. The email addresses of customers who sought support from Twitter, Pinterest, and Tumblr were leaked when attackers breached support services firm Zendesk in February 2013. Security and CDN service CloudFlare was infiltrated via its CEO's Gmail account.

And the beat goes on.

Piggybacking on third-party suppliers is now a well-worn page in attackers' playbooks. Both RSA and whitelisting provider Bit9 suffered compromises, not to steal their data, but to weaken the protections around companies that use their services. IT is aware of the threat; respondents to InformationWeek's 2014 Strategic Security Survey who feel more vulnerable to attack this year than last increasingly point to partners. Those citing an inability to audit or assess outsourcing and/or cloud vendors jumped by nine points year over year, with fears over vulnerability of key technology products shooting up 13 points.

"If I want to attack Fort Knox and I know they have locks and guards and strong security, it is easier to attack one of their providers who already have access to the gold," says James Christiansen, VP of information risk management for Accuvant, an information security service provider.

Adding insult to injury, companies breached via a third party generally find their recovery costs higher. In 2013, the average breach cost for a US firm was $201 per lost record, according to the Ponemon Institute's 2014 Cost of Data Breach Study: Global Analysis report. Third-party involvement was the second most important negative factor in the cost of a breach, costing companies an average of $14.80 more per record, just behind the impact of a lost or stolen device, which added $16.10 per record.

Vendors, Suppliers, Contractors -- Oh, My!
US companies rely heavily on third-party firms to provide services critical to their businesses yet generally have little visibility into the security practices of those firms. While larger suppliers may spend a significant amount on security, there is no guarantee -- and less likelihood -- that smaller partners are making similar investments, says BitSight's Boyer.

In short, supplier-based attacks are particularly scary because they're out of IT's control. "The only real knob or lever you have is the questionnaire," says Boyer, referring to the annual surveys many companies use to assess their suppliers' security and, in theory, prod providers into taking protections more seriously. Some supplier-customer pairs are more likely to be targeted, such as retailers reliant on third-party point-of-sale technology firms, companies attacked via their law firms, and medical information targeted through the doctor's office. But no one is immune.

To read the rest of this story, download the August
Dark Reading Tech Digest, distributed in an all-digital format (registration required).

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:14:27 AM
Re: 110 million? Not so big anymore
Other thing is that one is directly related to your back account and money, the other one is about usernames and passwords mainly and there may not be anything they can get out of that.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:12:13 AM
Re: 110 million? Not so big anymore
That makes sense, however I would think it is less about the number of records more about what results they gate out of attacks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:10:07 AM
Targets responsibility
 

Target may be working  with third parties but it is still Target's responsibly to make sure the third part they work with has proper controls in place to avoid a such attack that they faced.  Obviously nobody talks about third part but Target and consumers would hold target responsible.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
8/6/2014 | 4:55:10 PM
110 million? Not so big anymore
With reports that a Russian hacking group has amassed over 1 billion logins, 110 million hardly seems noteworthy.

But attacks on supplier equipment are scary. If the bag guys get there first, it's too late.
marklfeller
50%
50%
marklfeller,
User Rank: Apprentice
8/6/2014 | 3:57:50 PM
asada
My last pay check was $9500 working 12 hours a week online. My sisters friend has been averaging 15k for months now and she works about 20 hours a week. I can't believe how easy it was once I tried it out. This is what I do,

 

 

=======================

WWW.JOBS606.COM

======================= 
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.