The alarming rise of supply chain attacks poses a major threat to cybersecurity, according to Kamil Fedorko, Global Cybersecurity Practice Leader at Intellias. With attacks increasing by almost 750% annually between 2019 and 2022, cybercriminals are finding increasingly integrated digital supply chains to be an effective way to access networks and data. Supply chain attacks are successful when cyber criminals exploit weaknesses in less secure suppliers, vendors, or partners of the target organisation. While the concept of attacking digital supply chains has been around for years, it gained significant attention following the SolarWinds breach in 2020. Threat actors have since focused on supply chains with high-profile attacks on Okta and Kojima Industries Corp. Fedorko identifies two types of supply chain attacks: macro and micro. Macro attacks target widely used corporate systems and have been responsible for major incidents. Micro attacks focus on specific technologies and vulnerabilities and may be exploited by Advanced Persistent Threat groups and government-backed hacking units. Ransomware and malware are increasingly used in supply chain attacks, often incorporating sophisticated languages like RUST and GO. Organisations exposed to supply chain vulnerabilities need to take steps to reinforce security, such as implementing comprehensive software updates and patches to minimise risks. Systems should be monitored for Indicators of Compromise, and zero-trust approaches to cybersecurity should be considered to prevent lateral movement within supply chains. Organisations should also focus on backup, recovery, and incident-response policies and technologies to restore systems quickly if an incident occurs. Without significant investment in prevention, mitigation, and recovery, more organisations will suffer from successful supply chain attacks as digital integration increases.
Rising supply chain attacks: a worrisome battle we must confront
Latest from Blog
Beware Vanilla Tempest hackers target healthcare sectors, Microsoft alerts
TLDR: Vanilla Tempest, a ransomware group, is targeting healthcare organizations in the US using a new ransomware strain called “INC.” The attackers use tools like Supper backdoor, AnyDesk, and MEGA to further
Internet baffled by mysterious ‘Noise Storms’ stumping experts
TLDR: Internet intelligence firm GreyNoise has been tracking large waves of “Noise Storms” containing spoofed internet traffic since January 2020 The purpose and origin of these noise storms, suspected to be covert
Top 20 Linux Admin Tools for 2024
TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary
Evergy chooses OneLayer Bridge for private LTE network management and security
TLDR: Evergy has selected OneLayer Bridge for private LTE network management and security in a multi-year deal. The platform will help manage and secure thousands of devices on Evergy’s private LTE network,
Bogus job tempts aerospace, energy workers
TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives
Picus Security Secures $45M for Enhanced Exposure Management Solutions
TLDR: Picus Security has received a $45M investment from Riverwood Capital to enhance its exposure management platform. The investment will help Picus expand its capabilities in attack surface management, automated penetration testing,
Secure solar power with effective cybersecurity for renewable energy success
TLDR: Solar energy systems are vulnerable to outside attacks through inverters, microgrids, and DoS attacks. Cybersecurity professionals can protect solar energy by teaching security, updating software, and setting up a strong firewall.
Health sector cyberattacks Critics slam federal response as weak and disjointed
TLDR: Health care is the most frequent target for ransomware attacks. Federal response to cyberattacks in the health industry is criticized as feeble and fractured. Health care industry faced numerous cyberattacks, including
Beware: UNC2970 Hackers Weapons in Job Seekers’ PDFs
TLDR: UNC2970 hackers are targeting job seekers with weaponized PDF files. They use sophisticated phishing tactics to deliver malware to victims. In a recent report, cybersecurity analysts at Google Mandiant have identified
Cyber insurance changes shape of security for good and bad
TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses