Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5 Steps To Supply Chain Security

The integrity of enterprise data is only as strong as your most vulnerable third-party supplier or business partner. It's time to shore up these connection points.

Download the entire
August 2014 issue of
Dark Reading Tech Digest
, distributed in an all-digital format (registration required).

One of the largest known breaches, resulting in 110 million records lost and hundreds of millions of dollars in damages, started with a small, third-party supplier. We're talking about Target, where attackers compromised Fazio Mechanical Services, a provider of heating, ventilation, and air conditioning services, to gain access to the retail giant's network. The breach lasted 19 days and contributed to a 46% drop in year-over-year quarterly profits for the company, according to Target's filings with the Securities and Exchange Commission. Nearly 100 lawsuits have been filed so far, and Target's then CEO, Gregg Steinhafel, and its CIO, Beth Jacobs, have resigned.

"The Target breach is a watershed moment in third-party attacks," says Stephen Boyer, CEO of BitSight, a security intelligence firm. "No one wants to be the next one."

The breach may be a watershed, but it's hardly unique. The August 2013 defacement of The New York Times occurred because attackers fooled the media organization's DNS provider into granting access to the account that determined how the Internet routed traffic to the Times' site. Lockheed Martin suffered an attack through a flaw in RSA's SecurID system. The email addresses of customers who sought support from Twitter, Pinterest, and Tumblr were leaked when attackers breached support services firm Zendesk in February 2013. Security and CDN service CloudFlare was infiltrated via its CEO's Gmail account.

And the beat goes on.

Piggybacking on third-party suppliers is now a well-worn page in attackers' playbooks. Both RSA and whitelisting provider Bit9 suffered compromises, not to steal their data, but to weaken the protections around companies that use their services. IT is aware of the threat; respondents to InformationWeek's 2014 Strategic Security Survey who feel more vulnerable to attack this year than last increasingly point to partners. Those citing an inability to audit or assess outsourcing and/or cloud vendors jumped by nine points year over year, with fears over vulnerability of key technology products shooting up 13 points.

"If I want to attack Fort Knox and I know they have locks and guards and strong security, it is easier to attack one of their providers who already have access to the gold," says James Christiansen, VP of information risk management for Accuvant, an information security service provider.

Adding insult to injury, companies breached via a third party generally find their recovery costs higher. In 2013, the average breach cost for a US firm was $201 per lost record, according to the Ponemon Institute's 2014 Cost of Data Breach Study: Global Analysis report. Third-party involvement was the second most important negative factor in the cost of a breach, costing companies an average of $14.80 more per record, just behind the impact of a lost or stolen device, which added $16.10 per record.

Vendors, Suppliers, Contractors -- Oh, My!
US companies rely heavily on third-party firms to provide services critical to their businesses yet generally have little visibility into the security practices of those firms. While larger suppliers may spend a significant amount on security, there is no guarantee -- and less likelihood -- that smaller partners are making similar investments, says BitSight's Boyer.

In short, supplier-based attacks are particularly scary because they're out of IT's control. "The only real knob or lever you have is the questionnaire," says Boyer, referring to the annual surveys many companies use to assess their suppliers' security and, in theory, prod providers into taking protections more seriously. Some supplier-customer pairs are more likely to be targeted, such as retailers reliant on third-party point-of-sale technology firms, companies attacked via their law firms, and medical information targeted through the doctor's office. But no one is immune.

To read the rest of this story, download the August
Dark Reading Tech Digest, distributed in an all-digital format (registration required).

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
marklfeller
50%
50%
marklfeller,
User Rank: Apprentice
8/6/2014 | 3:57:50 PM
asada
My last pay check was $9500 working 12 hours a week online. My sisters friend has been averaging 15k for months now and she works about 20 hours a week. I can't believe how easy it was once I tried it out. This is what I do,

 

 

=======================

WWW.JOBS606.COM

======================= 
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
8/6/2014 | 4:55:10 PM
110 million? Not so big anymore
With reports that a Russian hacking group has amassed over 1 billion logins, 110 million hardly seems noteworthy.

But attacks on supplier equipment are scary. If the bag guys get there first, it's too late.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:10:07 AM
Targets responsibility
 

Target may be working  with third parties but it is still Target's responsibly to make sure the third part they work with has proper controls in place to avoid a such attack that they faced.  Obviously nobody talks about third part but Target and consumers would hold target responsible.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:12:13 AM
Re: 110 million? Not so big anymore
That makes sense, however I would think it is less about the number of records more about what results they gate out of attacks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/8/2014 | 11:14:27 AM
Re: 110 million? Not so big anymore
Other thing is that one is directly related to your back account and money, the other one is about usernames and passwords mainly and there may not be anything they can get out of that.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.