Cloud

1/19/2018
10:30 AM
Liviu Arsene
Liviu Arsene
Commentary
Connect Directly
Twitter
Google+
LinkedIn
RSS
E-Mail vvv
50%
50%

Understanding Supply Chain Cyber Attacks

While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.

Today's cybersecurity landscape has changed dramatically due to digitalization and interconnectivity. While the benefits of each push businesses toward adoption, security risks associated with interconnectivity between networks and systems raise major concerns. Everything-as-a-service removes traditional security borders and opens the door to new cyber attacks that organizations might not be prepared to recognize or even deal with.

Moving resources into the hands of the final consumer now involves creating systems that handle, distribute, and process goods using a complex network of suppliers and services. These supply chains are what cybercriminals try to exploit, as third-party suppliers usually have some level of access to their customer's network. This, coupled with an advancing software stack that's integrated with critical internal infrastructures, increases the attack surface that threat actors can exploit to breach perimeter defenses.

Trust Is Often Exploited
The relationship between humans and technology is far from perfect. Cloud technologies can themselves be unpredictable in that they may interact with each other in unforeseen ways. When you add the human factor, which is inherently unpredictable, it raises security concerns that can be impossible to predict.

The cloud has become an integral part of digital businesses, but the lack of proper authorization, accountability, and authentication in the cloud enables security threats that we've come to know as supply chain attacks. This increased adoption of cloud services must push organizations to constantly reassess external audit programs and due diligence processes. This practice of regular re-evaluation must go through constant iterations to identify potential security blind spots while decreasing incident response times.

Unfortunately, for the past few years we've seen a series of supply chain attacks that have led to millions of customers having personal and private data exposed because of blind spots inherent in current supply chain security. The Target incident in which 41 million customer records were exposed has become a case study for supply chain attacks that leverage third-party access into critical infrastructures.

Arguably, the biggest recent supply chain blunder is the GoldenEye ransomware incident that involved a tainted update to a popular accounting platform used by many companies. Compromising an update server with a legitimate piece of software, the malware spread across organizations using the accounting platform.

Supply chain attacks have even targeted the average user when a tampered version of a popular Apple Xcode IDE application development framework was injected with malicious code. App developers using the tainted framework unknowingly created applications bundled with malware that could not only steal personal and private data from users but also allow for complete remote control of devices. Dubbed XcodeGhost, this supply chain attack scenario demonstrates that threat actors can even breach organizations by targeting developers.

Because complex infrastructures are sometimes difficult to maintain by IT operations, the use of automated tools that can be deployed remotely throughout the infrastructure can be vital in ensuring a productive supply chain. Unfortunately, these tools — although legitimate — can also be leveraged as attack vectors into organizations, bypassing standard security procedures. CCleaner, a popular free tool for optimizing system performance, was tampered with by cybercriminals and injected with malware that targeted technology and telecommunications companies. Because IT operations widely deploy the tool within infrastructures, it's estimated that 2.27 million systems could have been affected by the backdoor capabilities of the injected malware.

Managing Supply Chain Risks
Host organizations now face having to adapt security procedures to include not just internal infrastructures, but also vendors, customers, and even partners. While internal IT and security departments might have strong security practices for thwarting a wide range of direct attacks, third-party collaborators might not adhere to the same culture. Consequently, programs for vetting vendors need to be in place before fully integrating them into internal infrastructures.

Building a vendor management program is ideal and should start with defining an organization's most important vendors. Building the program around a risk-based approach ensures that vendors are constantly evaluated and assessed, and their policies are consistent with the host organization.

Besides requiring vendors to provide timely notification of any internal security incident, periodic security reports should be included in the collaboration guidelines to regularly ascertain their security status. Because security is a dynamic and ongoing process, these procedures should be constantly updated and audited in accordance with best practices and the host company's security requirements.

Constantly reviewing technology, people, and processes — both internally and from suppliers — filters out easily exploitable supply chain attacks that could prove devastating for the host organization and the supplier. This procedure should encompass everything from employees joining the organization, to new technologies being integrated with existing systems and internal process regarding security incident responses, as well as the implementation of security best practices.

The Security Perimeter Is Borderless
No longer are strong perimeter defenses enough; security teams must consider that digitalization has taken down all network borders. And while the attack surface has increased exponentially because of it, there are still ways in which host companies can harden supply chain security even if it only involves the establishment of new procedures.

The borderless security perimeter that's a natural consequence of infrastructure-as-a-service shows that security models must change to cope with the new threat landscape. As previously mentioned, ongoing assessment processes are vital in building and maintaining a strong security posture, and it's only one of the security controls necessary to harden defenses. Cybercrime is committed in the digital arena; for that reason, organizations must have strict authorization, authentication, and accounting mechanisms for securing critical data and controlling who has access to it.

However, the deployment of security controls specifically designed for physical, virtual, locally deployed, or in-the-cloud infrastructures is also important. It's crucial for digital businesses and large organizations to implement a layered security approach customized to their risk profile, if they are to fully and successfully leverage the benefits of everything-as-a-service.

Related Content:

Liviu Arsene is a senior e-threat analyst for Bitdefender, with a strong background in security and technology. Reporting on global trends and developments in computer security, he writes about malware outbreaks and security incidents while coordinating with technical and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.