- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
On the occasion of the SolarWinds sunburst incident, there was a whole lot of lessons learned for the security community, not only that numerous authorities in Germany and abroad are affected. Without wanting to go into the details are known up to now, it can be stated that supply chain attacks will increase, also with a view to the attacks that have become known against the EU authority EMA commissioned with the certification of the vaccine from the manufacturer Pfizer / Biotech.
The fact that even the stolen data is published, as in this
case, is due to a new quality of ransomware attacks, in which the data is
encrypted and copied on the one hand, and put on the network as a so-called
"double extortion" on the other. Ultimately, attackers are after
data and follow the path of data from one company to another to pick
out the weakest and easiest link in the chain. This strategy always comes
into play when professional attackers are behind the attacks, who have invested
a lot of time and effort in exploring their target. This is what makes
them so dangerous and makes protecting them so expensive.
But what
exactly is a supply chain attack?
Classically, the term means the compromising of software code or
an application that is developed by a third party and is then used in other
widespread software or systems. There have been enough examples since
Target 2014, so the phenomenon is well known, but the extent and sophistication
behind the recent attacks make you sit up and take notice and do not anticipate
anything good for the future. Given the extent of the
interconnectedness of today's economy and the dependency on functioning supply
chains, the term “supply chain” can be understood even more broadly if it is
understood as a “value chain” or even further as a “third party” attack. Attackers
look at the entire supply chain, they have time, they wait, they look for
vulnerabilities, for example in accounting software, which is used by some
companies and also by the suppliers or branches abroad. The gateway does
not have to be large, but it remains unnoticed for a long time. As in the many
cases that have come to light, the attackers can spread out in peace and
gradually gain access to the data sets of interest to them. The threat is
now so great that in a study by the US security service provider BlueVoyant,
more than 80 percent of those surveyed confirmed that they had already been the
victim of such an indirect attack. the attackers can spread out in peace
and gradually gain access to the data sets of interest to them. The threat
is now so great that in a study by the US security service provider BlueVoyant,
more than 80 percent of those surveyed confirmed that they had already been the
victim of such an indirect attack. the attackers can spread out in peace
and gradually gain access to the data sets of interest to them. The threat
is now so great that in a study by the US security service provider BlueVoyant,
more than 80 percent of those surveyed confirmed that they had already been the
victim of such an indirect attack.
Given the increasing attacks on and via suppliers and
third-party companies, companies should therefore pay more attention than ever
to how their supply chains - everything from software development to the actual
delivery processes themselves - are set up in terms of IT security. In
addition to strong encryption and access control, raising employees' awareness
is of particular importance. Only those who keep an eye on their supply
chains can protect themselves from cyber attacks, even if there is no
comprehensive protection.
Try total security software for your organization's security protection.
- Get link
- X
- Other Apps
Comments
Post a Comment