Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/29/2021
10:00 AM
Rui Ribeiro
Rui Ribeiro
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail vvv
50%
50%

Is the Web Supply Chain Next in Line for State-Sponsored Attacks?

Attackers go after the weak links first, and the Web supply chain provides an abundance of weak links to target.

After the SolarWinds breach that infected thousands of organizations and at least 250 federal agencies and businesses, and with new complex attacks like the one on the Vietnam Government Certification Authority, companies and executives are realizing how susceptible their own systems are to supply chain attacks.

Related Content:

SolarWinds Hack Lessons Learned

Special Report: Understanding Your Cyber Attackers

6 Best Practices for Using Open-Source Software Safely

As industry experts have pointed out, the SolarWinds incident shows how some cyberattacks are nearly impossible to detect. It also raises questions about the overall vulnerability of government and private sector networks and prompted the National Security Council to stand up a task force, the Cyber Unified Coordination Group, to coordinate the investigation and remediation of this incident.

As is typical in a supply chain attack, in the SolarWinds incident, the malicious code was inserted during a legitimate software update — in this case, to SolarWinds' Orion platform — and hidden within a digitally signed software component.

When it comes to supply chains, blind trust and long, complex chains are two key ingredients for disaster. However, these are two constants in nearly every Web application and website that is online right now.

The Web supply chain is a mash-up of third-party code with thousands of ramifications. Today, Web applications have 1,000 modules (also known as code dependencies) on average. Each of these modules has dependencies of its own and so each Web app can quickly rack up thousands of pieces of third-party code. Don't forget that each of these pieces also represents an increase of the attack surface, especially considering that these third parties often have fewer resources dedicated to security. As we've seen several times, it just takes one ill-intentioned user to launch a serious Web supply chain attack.

A 2019 study explored the possible side effects of this reliance on third-party code on the Web. One key problem the authors outlined is the lack of privilege separation on the Web — all pieces of third-party code have the same privileges as code that is developed internally. A breach on a single piece of third-party code can silently send malicious code down the supply chain and into a legitimate software update — just like what happened in the SolarWinds incident. But in the case of the Web supply chain, the picture gets much worse. The same team of researchers found that 20 maintainer accounts can reach more than half of the entire Web ecosystem — meaning that a single breach in one of these accounts can trigger a global Web supply chain attack and affect millions of organizations.

Another approach to Web supply chain attacks, known as Magecart or Web skimming, has also been gaining momentum. This approach consists of injecting malicious code into a third-party script, such as a live chat widget, to load the infected code whenever end users access a certain webpage. In Magecart Web skimming attacks, the code collects all credit card data submitted on payment forms and covertly sends it to attackers' drop servers.

Could either or both of these approaches lead to massive state-sponsored attacks on the Web? Researchers have spotted clear links between Web supply chain attacks and state-sponsored hacking crews on multiple occasions. We know that attackers always go after the weak links first, and the Web supply chain provides an abundance of weak links to target.

Just like the SolarWinds incident showed, companies can't risk the critical impact of a supply chain attack. Solving Web supply chain attacks requires taking action now, understanding this security weakness, and actively finding ways to reduce the attack surface.

In practice, organizations must reduce their reliance on third-party code whenever possible, reinforce their vetting practices, and employ mechanisms to detect malicious client-side behavior at runtime. This latter strategy has gained momentum because it allows organizations to detect all signs of malicious behavior in real time without relying on signatures. As such, runtime monitoring can vastly reduce the time needed to detect and block the source of the attack.

Web supply chain attacks keep growing in complexity, taking advantage of the overall chaos of client-side code. A strong commitment to improved application security is surely the best weapon that organizations can bring to this Web supply chain battle.

CEO and Co-Founder of Jscrambler, Rui Ribeiro has led the company since 2007 from bootstrapping to a growing business. Currently, he executes the company's growth strategy and manages its vision and culture. With over 15 years of experience in the information technology ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...