Supply chain attack
   HOME

TheInfoList



OR:

A supply chain attack is a
cyber-attack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018. The Target security breach, Eastern European ATM malware, as well as the
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing subs ...
computer worm are examples of supply chain attacks. Supply chain management experts recommend strict control of an institution's supply network in order to prevent potential damage from cyber criminals.


Overview

A supply chain is a system of activities involved in handling, distributing, manufacturing, and processing goods in order to move resources from a vendor into the hands of the final consumer. A supply chain is a complex network of interconnected players governed by supply and demand. Although supply chain attack is a broad term without a universally agreed upon definition, in reference to cyber-security, a supply chain attack involves physically tampering with electronics (computers, ATMs, power systems, factory data networks) in order to install undetectable malware for the purpose of bringing harm to a player further down the supply chain network. In a more general sense, a supply chain attack may not necessarily involve electronics. In 2010 when burglars gained access to the pharmaceutical giant Eli Lilly's supply warehouse, by drilling a hole in the roof and loading $80 million worth of prescription drugs into a truck, they could also have been said to carry out a supply chain attack. However, this article will discuss cyber attacks on physical supply networks that rely on technology; hence, a supply chain attack is a method used by cyber-criminals.


Attack framework

Generally, supply chain attacks on information systems begin with an
advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may ...
(APT)BRAD D. WILLIAMS (July 01, 2021) US-UK Warn Of New Worldwide Russian Cyberespionage
Context for some threat naming schemas: APT, GRU, Fancy bear, SVR, etc.
that determines a member of the supply network with the weakest cyber security in order to affect the target organization. According to an investigation produced by Verizon Enterprise, 92% of the cyber security incidents analyzed in their survey occurred among small firms. APT's can often gain access to sensitive information by physically tampering with the production of the product. In October 2008, European law-enforcement officials "uncovered a highly sophisticated credit-card fraud ring" that stole customer's account details by using untraceable devices inserted into credit-card readers made in China to gain access to account information and make repeated bank withdrawals and Internet purchases, amounting to an estimated $100 million in losses.


Risks

The threat of a supply chain attack poses a significant risk to modern day organizations and attacks are not solely limited to the information technology sector; supply chain attacks affect the oil industry, large retailers, the pharmaceutical sector and virtually any industry with a complex supply network. The Information Security Forum explains that the risk derived from supply chain attacks is due to information sharing with suppliers, it states that "sharing information with suppliers is essential for the supply chain to function, yet it also creates risk... information compromised in the supply chain can be just as damaging as that compromised from within the organization". While Muhammad Ali Nasir of the National University of Emerging Sciences, associates the above-mentioned risk with the wider trend of globalization stating "…due to globalization, decentralization, and outsourcing of supply chains, numbers of exposure points have also increased because of the greater number of entities involved and that too are scattered all around the globe… cyber-attack on supply chain is the most destructive way to damage many linked entities at once due to its ripple effect." Poorly managed supply chain management systems can become significant hazards for cyber attacks, which can lead to a loss of sensitive customer information, disruption of the manufacturing process, and could damage a company's reputation.


Examples


Compiler attacks

Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San ...
reported a connecting thread in recent software supply chain attacks, as of 3 May 2019. These have been surmised to have spread from infected, pirated, popular compilers posted on pirate websites. That is, corrupted versions of Apple's XCode and Microsoft Visual Studio. (In theory, alternating compilers might detect compiler attacks, when the compiler is the trusted root.)


Target

At the end of 2013,
Target Target may refer to: Physical items * Shooting target, used in marksmanship training and various shooting sports ** Bullseye (target), the goal one for which one aims in many of these sports ** Aiming point, in field artillery, f ...
, a US retailer, was hit by one of the largest data breaches in the history of the retail industry. Between 27 November and 15 December 2013, Target's American brick-and-mortar stores experienced a data hack. Around 40 million customers' credit and debit cards became susceptible to fraud after malware was introduced into the POS system in over 1,800 stores. The data breach of Target's customer information saw a direct impact on the company's profit, which fell 46 percent in the fourth quarter of 2013. Six months prior the company began installing a $1.6 million cyber security system. Target had a team of security specialists to monitor its computers constantly. Nonetheless, the supply chain attack circumvented these security measures. It is believed that cyber criminals infiltrated a third party supplier to gain access to Target's main data network. Although not officially confirmed, investigation officials suspect that the hackers first broke into Target's network on 15 November 2013 using passcode credentials stolen from Fazio Mechanical Services, a Pennsylvania-based provider of HVAC systems. Ninety lawsuits have been filed against Target by customers for carelessness and compensatory damages. Target spent around $61 million responding to the breach, according to its fourth-quarter report to investors.


Stuxnet

Believed to be an American-Israeli
cyber weapon Cyber may refer to: Computing and the Internet * ''Cyber-'', from cybernetics, a transdisciplinary approach for exploring regulatory and purposive systems Crime and security * Cyber crime, crime that involves computers and networks ** Conventi ...
, Stuxnet is a malicious computer worm. The worm specifically targets systems that automate electromechanical processes used to control machinery on factory assembly lines or equipment for separating nuclear material. The computer worm is said to have been specifically developed in order to damage potential
uranium enrichment Enriched uranium is a type of uranium in which the percent composition of uranium-235 (written 235U) has been increased through the process of isotope separation. Naturally occurring uranium is composed of three major isotopes: uranium-238 (238 ...
programs by the Government of Iran; Kevin Hogan, Senior Director of Security Response at Symantec, reported that the majority of infected systems by the Stuxnet worm were located in the Islamic Republic of Iran, which has led to speculation that it may have been deliberately targeting "high-value infrastructure" in the country including either the
Bushehr Nuclear Power Plant The Bushehr Nuclear Power Plant ( fa, نیروگاه اتمی بوشهر) is a nuclear power plant in Iran south of Tehran ( southeast of the city of Bushehr), between the fishing villages of Halileh and Bandargeh along the Persian Gulf. Con ...
or the Natanz nuclear power plant. Stuxnet is typically introduced into the supply network via an infected USB flash drive with persons with physical access to the system. The worm then travels across the cyber network, scanning software on computers controlling a programmable logic controller (PLC). Stuxnet introduces the infected rootkit onto the PLC modifying the codes and giving unexpected commands to the PLC while returning a loop of normal operation value feedback to the users.


ATM malware

In recent years malware known as Suceful, Plotus, Tyupkin and GreenDispenser have affected
automated teller machine An automated teller machine (ATM) or cash machine (in British English) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, fun ...
s globally, especially in Russia and the Ukraine. GreenDispenser specifically gives attackers the ability to walk up to an infected ATM system and remove its cash vault. When installed, GreenDispenser may display an ‘out of service’ message on the ATM, but attackers with the right access credentials can drain the ATM's cash vault and remove the malware from the system using an untraceable delete process. The other types of malware usually behave in a similar fashion, capturing magnetic stripe data from the machine's memory storage and instructing the machines to withdraw cash. The attacks require a person with insider access, such as an ATM technician or anyone else with a key to the machine, to place the malware on the ATM. The Tyupkin malware active in March 2014 on more than 50 ATMs at banking institutions in Eastern Europe, is believed to have also spread at the time to the U.S., India, and China. The malware affects ATMs from major manufacturers running Microsoft Windows 32-bit operating systems. The malware displays information on how much money is available in every machine and allows an attacker to withdraw 40 notes from the selected cassette of each ATM.


NotPetya / M.E.Doc

During the spring of 2017, the core code of the financial package "M.E.Doc" used in Ukraine was infected with the NotPetya virus and subsequently downloaded by subscribers. The hack was carried out on the provider's system: either hacking the code itself at the provider, or a hack re-routing download requests to another server. Press reports at the time make it clear this was a supply chain attack, but the attack vector used is not specified.


British Airways

During August and September 2018 the British Airways website payment section contained a code that harvested customer payment data. The injected code was written specifically to route credit card information to a website in the domain baways.com, which could erroneously be thought to belong to British Airways.


SolarWinds

The 2020 Global Supply Chain Cyberattack is believed to have resulted through a supply chain attack targeting the IT infrastructure company
SolarWinds SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development offi ...
, which counts many federal institutions among its clients, including the business computers of the
National Nuclear Security Administration The National Nuclear Security Administration (NNSA) is a United States federal agency responsible for safeguarding national security through the military application of Nuclear physics, nuclear science. NNSA maintains and enhances the Stockpil ...
(NNSA). The
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
has issued Emergency Directive 21-01, "Mitigate SolarWinds Orion Code Compromise" which involves disconnecting any afflicted Windows host OS from its enterprise domain, and rebuilding those Windows hosts using trusted sources. The afflicted Windows operating system (OS) hosts were those monitored by the SolarWinds Orion monitoring software.Department of Homeland Security (13 Dec 2020) Emergency Directive 21-01, "Mitigate SolarWinds Orion Code Compromise"
/ref> DOE's NNSA has since disconnected the breached Windows hosts. In addition to the U.S. federal government, 18,000 out of SolarWinds' 33,000 customers who use the SolarWinds Orion software update platform are vulnerable. Orion was compromised in March and June 2020, before the cyber breach was detected by
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigat ...
in December 2020. For example,
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
was itself a victim of the update software breach.T.C. Sottek (Dec 31, 2020) Microsoft says hackers were able to see some of its source code
/ref> Microsoft is now working with FireEye to contain the ongoing cyber attack contained in supply chain software used by "government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East" —FireEye.
/ref> Volexity, a cybersecurity firm, has reconstructed the attack sequence on an unnamed US think tank: first, the attacker exploited a remote code execution vulnerability in an on-premise Microsoft Exchange server; after that vulnerability was remedied, the attacker exploited security holes in the SolarWinds Orion platform, which were exposed in December 2020; third, the think tank's Duo two-factor authentication proxy server was exploited to gain access to breach the infrastructure of the think tank yet again.Ionut Ilascu (December 17, 2020) Nation-state hackers breached US think tank thrice in a row
/ref> Based on Volexity's reconstruction, ''Breaking Defense'' has published a simplified
kill chain The term kill chain is a military concept which identifies the structure of an attack. It consists of: * identification of target * dispatching of forces to target * initiation of attack on target * destruction of target Conversely, the idea o ...
explaining the
Exchange Server Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems. The first version was called Exchange Server 4.0, to position it as the successor to the related ...
attack on an estimated 30,000 customers worldwide.Brad D Williams (29 Mar 2021) SolarWinds: ‘The Truth Is Much More Complicated’
Follow-on damage to US government by Russian op
In July 2021 SolarWinds announced it was attacked yet again.


Microsoft Exchange Server

In February 2021 Microsoft determined that the attackers had downloaded a few files "(subsets of service, security, identity)" apiece from Dan Goodin ''Ars Technica'' (2/18/2019) POST-MORTEM — Microsoft says SolarWinds hackers stole source code for 3 products
/ref> *"a small subset of Azure components" *"a small subset of Intune components" *"a small subset of Exchange components" None of the Microsoft repositories contained production credentials. The repositories were secured in December, and those attacks ceased in January. However, in March 2021 more than 20,000 US organizations were compromised through a back door that was installed via flaws in Exchange Server.Brian Barrett (6 Mar 2021) China’s and Russia’s spying spree will take years to unpack
/ref> The affected organizations use self-hosted e-mail (on-site rather than cloud-based) such as credit unions, town governments, and small businesses. The flaws were patched on 2 March 2021, but by 5 March 2021 only 10% of the compromised organizations had implemented the patch; the back door remains open.The_Exchange_Team Microsoft (8 March 2021) March 2021 Exchange Server Security Updates for older Cumulative Updates of Exchange Server
3/10/2021 released updates for E2019 CU3. E2016 CU12, 13 and 17. E2013 CU21 and 22. 3/8/2021 released updates for E2019 CU4, 5, and 6. E2016 CU14, 15, and 16.
The US officials are attempting to notify the affected organizations which are smaller than the organizations that were affected in December 2020.Joseph Menn, Raphael Satter, Trevor Hunnicutt (5 Mar 2021) More than 20,000 U.S. organizations compromised through Microsoft flaw
/ref> Microsoft has updated its Indicators of Compromise tool and has released emergency mitigation measures for its Exchange Server flaws.Brad D Williams (6 Mar 2021) Microsoft Pushes Urgent Fixes Overnight As Threat Actors Compromise Exchange Servers Worldwide
/ref> The attacks on SolarWinds and Microsoft software are currently thought to be independent, as of March 2021. The Indicators of Compromise tool allows customers to scan their Exchange Server log files for compromise.Lily Hay Newman (10 March 2021) It’s Open Season for Microsoft Exchange Server Hacks
/ref>(9 March 2021) I can't believe I have to say this (again) ...
/ref> At least 10 attacking groups are using the Exchange Server flaws.Reuters (March 2021) At least 10 hacking groups using Microsoft software flaw -researchers
/ref>Allana Akhar (12 Mar 2021) Google accused Microsoft of unfairly attacking the tech giant to distract from the massive Exchange hack
Rival distractions

/ref>
Web shell A web shell is a shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks. A web shell is unique in that a web browser is used to interact with it. A web shell could be programmed in any pro ...
s can remain on a patched server; this still allows cyberattacks based on the affected servers.Dan Goodin (23 Mar 2021) Ransomware operators are piling on already hacked Exchange servers
/ref> As of 12 March 2021 exploit attempts are doubling every few hours, according to Check Point Research,Charlie Osborne (12 March 2021) Microsoft Exchange Server hacks ‘doubling’ every two hours
some in the name of security researchers themselves.Shadowserver (28 Mar 2021) Attackers Breach 21,000 Microsoft Exchange Servers, Install Malware Implicating Brian Krebs (krebsonsecurity.com)
malicious code spoofing Krebs
By 14 April 2021 the
FBI The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
had completed a covert cyber operation to remove the web shells from afflicted servers and was informing the servers' owners of what had been done. In May 2021 Microsoft identified 3000 malicious emails to 150 organizations in 24 countries, that were launched by a group that Microsoft has denoted 'Nobelium'. Many of those emails were blocked before delivery. 'Nobelium' gained access to a Constant Contact "email marketing account used by the US Agency for International Development (
USAID The United States Agency for International Development (USAID) is an independent agency of the U.S. federal government that is primarily responsible for administering civilian foreign aid and development assistance. With a budget of over $27 bi ...
)".Jill Disis and Zahid Mahmood (28 May 2021) Microsoft says SolarWinds hackers have struck again at the US and other countriesPhil Helsel, Ezra Kaplan and Kevin Collier (28 May 2021) SolarWinds hackers are at it again, targeting 150 organizations, Microsoft warnsPatrick Reevell (May 28, 2021) Kremlin rejects new Microsoft allegations it carried out hack via State Department email: Microsoft said Thursday the hack targeted dozens of organizations.
/ref> Security researchers assert that 'Nobelium' crafts spear-phishing email messages which get clicked on by unsuspecting users; the links then direct installation of malicious 'Nobelium' code to infect the users' systems, making them subject to ransom, espionage, disinformation, etc.Lily Hay Newman (30 May 2021) The SolarWinds hackers aren’t back—they never went away
/ref> The US government has identified 'Nobelium' as stemming from Russia's Federal Security Service.Dan Goodin (26 Jun 2021) SolarWinds hackers breach new victims, including a Microsoft support agent
/ref> By July 2021 the US government is expected to name the initiator of the Exchange Server attacks:Brad D Williams (2 Jul 2021) China Likely Outed Soon For Exchange Hacks
/ref> "China’s Ministry of State Security has been using criminal contract hackers".ERIC TUCKER (19 Jul 2021) Microsoft Exchange email hack was caused by China, US says
Brad D Williams (22 Jul 2021) US Playing Long Game To Pressure China On Cyber Ops: Experts
/ref> In September 2021 the Securities and Exchange Commission (SEC) enforcement staff have requested that any companies which have downloaded any compromised SolarWinds updates, voluntarily turn over data to the SEC if they have installed the compromised updates on their servers.Christopher Bing and Chris Prentice, Joseph Men
(10 Sep 2021) Wide-Ranging SolarWinds Probe Sparks Fear in Corporate America (Reuters.com)
/ref> In July 2022 SessionManager, a malicious module hosted by IIS (installed by default on Exchange Servers), was discovered to have infected Exchange Servers since March 2021; SessionManager searches memory for passwords, and downloads new modules, to hijack the server.Dan Goodi
(30 Jun 2022) Microsoft Exchange servers worldwide hit by stealthy new backdoor


Golden SAML

Mandiant, a security firm, has shown that nation-state-sponsored groups, once they have gained access to corporate clouds, can now exploit Security assertion markup language (
SAML Security Assertion Markup Language (SAML, pronounced ''SAM-el'', ) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based ...
), to gain federated authentication to Active Directory and similar services, at will.


Ransomware attacks

In May 2021 A ransomware attack on the Colonial pipeline exposed the vulnerability of the US's gasoline supply on the East coast.Reuters (8 May 2021) Cyber attack shuts down top U.S. fuel pipeline network
/ref>BBC (May 10, 2021) US Scrambles to Keep Fuel Flowing After Pipeline Cyberattack. Russian Cybercriminals Suspected
/ref>Dustin Volz (10 May 2021) U.S. Blames Criminal Group in Colonial Pipeline Hack
Darkside
Associated Press (10 May 2021) US invokes emergency powers after cyberattack shuts crucial fuel pipeline
/ref> On 16 June 2021, President Biden warned President Putin that 16 types of infrastructure were to be off-limits to cyberattack, or else Russia would suffer in kind.
/ref> A combination of supply-chain attack and ransomware attack surfaced on 2 July 2021 at thousands of companies in 17 countries.AP (5 Jul 2021) World's Single-Biggest Ransomware Attack Hit 'Thousands' in 17 Countries
/ref> An
REvil REvil (Ransomware Evil; also known as Sodinokibi) was a Russia-based or Russian-speaking private ransomware-as-a-service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page ''Happy Blog'' unless the ra ...
ransomware code is written to avoid hitting sites that use Russian.NBC news (7 July 2021) Code In Huge Ransomware Attack Written To Avoid Computers That Use Russian, Says New Report
REvil. Darkside is the Ransomware attacker of Colonial pipeline
The REvil site is now offline according to ''The New York Times''.'' The New York Times'' David E. Sanger (14 Jul 2021) "Ransomware group goes offline. The culprit is not yet clear." p.A6


Prevention

On 12 May 2021, Executive order 14028 (the EO), ''Improving the nation's cybersecurity'', tasked NIST as well as other US government agencies with enhancing the cybersecurity of the United States.(11 July 2021) NIST Delivers Two Key Publications to Enhance Software Supply Chain Security Called for by Executive Order
/ref> On 11 July 2021 (day 60 of the EO timeline) NIST, in consultation with the
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government, ...
(CISA) and the
Office of Management and Budget The Office of Management and Budget (OMB) is the largest office within the Executive Office of the President of the United States (EOP). OMB's most prominent function is to produce the president's budget, but it also examines agency programs, pol ...
(OMB), delivered '4i': guidance for users of critical software, as well as '4r': for minimum vendor testing of the security and integrity of the software supply chain. *Day 30: solicit inputNIST (2-3 Jun 2021) Workshop and Call for Position Papers on Standards and Guidelines to Enhance Software Supply Chain Security
1400 participants, 150 position papers
*Day 45: define 'critical software'NIST (25 Jun 2021) Definition of Critical Software Under Executive Order (EO) 14028
another NIST source: EXECUTIVE ORDER 14028, IMPROVING THE NATION'S CYBERSECURITY task 4
(26 Jun 2021) Critical Software Definition
/ref> *Day 60: EO task 4i, 4r: user guidance, and vendor testing *Day 180: EO task 4c: guidelines for enhancing supply chain software security *Day 270: EO task 4e, 4s, 4t, 4u: guidelines for enhancing supply chain software *Day 360: EO task 4d: guidelines for review and update procedures of supply chain software *Day 365: EO task 4w: summary support of the pilot


Government

The
Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative (CNCI) outlines U.S. cybersecurity goals across multiple agencies including the Department of Homeland Security, the Office of Management and Budget, and the National Security Agency. The initiativ ...
and the Cyberspace Policy Review passed by the Bush and Obama administrations respectively, direct U.S. federal funding for development of multi-pronged approaches for global supply chain risk management. According to Adrian Davis of the Technology Innovation Management Review, securing organizations from supply chain attacks begins with building cyber-resilient systems. Supply chain resilience is, according to supply chain risk management expert Donal Walters, "the ability of the supply chain to cope with unexpected disturbances" and one of its characteristics is a company-wide recognition of where the supply chain is most susceptible to infiltration. Supply chain management plays a crucial role in creating effective supply chain resilience. In March 2015, under the Conservative and Liberal democratic government coalition, the UK Department for Business outlined new efforts to protect SMEs from cyber attacks, which included measures to improve supply chain resilience. The UK government has produced the Cyber Essentials Scheme, which trains firms for good practices to protect their supply chain and overall cyber security.


Financial institutions

The Depository Trust and Clearing Group, an American post-trade company, in its operations has implemented governance for vulnerability management throughout its supply chain and looks at IT security along the entire development lifecycle; this includes where software was coded and hardware manufactured. In a 2014 PwC report, titled "Threat Smart: Building a Cyber Resilient Financial Institution", the financial services firm recommends the following approach to mitigating a cyber attack:
"To avoid potential damage to a financial institution’s bottom line, reputation, brand, and intellectual property, the executive team needs to take ownership of cyber risk. Specifically, they should collaborate up front to understand how the institution will defend against and respond to cyber risks, and what it will take to make their organization cyber resilient.


Cyber security firms

FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigat ...
, a US network security company that provides automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing, recommends firms to have certain principles in place to create resilience in their supply chain, which includes having: * A small supplier base: This allows a firm to have tighter control over its suppliers. * Stringent vendor controls: Imposing stringent controls on suppliers in order to abide by lists of an approved protocols. Also conducting occasional site audits at supplier locations and having personnel visiting the sites on a regular basis for business purposes allows greater control. * Security built into design: Security features, such as check digits, should be designed into the software to detect any previous unauthorized access to the code. An iterative testing process to get the code functionally hardened and security-hardened is a good approach. On 27 April 2015, Sergey Lozhkin, a Senior Security Researcher with GReAT at
Kaspersky Lab Kaspersky Lab (; Russian: Лаборатория Касперского, tr. ''Laboratoriya Kasperskogo'') is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in th ...
, spoke about the importance of managing risk from targeted attacks and cyber-espionage campaigns, during a conference on cyber security he stated:
"Mitigation strategies for advanced threats should include security policies and education, network security, comprehensive system administration and specialized security solutions, like... software patching features, application control, whitelisting and a default deny mode."


See also

*
Advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may ...
*
Cyber-attack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
*
Watering hole attack Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hac ...


Notes


References

{{Reflist


External links


New ATM Malware Captures PINs and Cash — Updated
– ''
Wired ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San ...
'' Cryptographic attacks