🔗

Supply Chain Attacks 47

Sep 13, 2025

Overview

This lecture discusses supply chain security risks, illustrating how vulnerabilities in vendors, hardware, or software can compromise an organization's network and data.

Supply Chain Security Risks

  • The supply chain includes suppliers, manufacturers, distributors, and customers, creating multiple security concerns.
  • Every point in the supply chain is a potential target for attackers to access your organization.
  • Exploits at a supplier or provider outside your control can threaten your organization's security.
  • Third-party vendors may have direct or indirect network access, increasing risk if compromised.

Vendor and Third-Party Provider Threats

  • Attackers may exploit network providers, utilities, payroll, or cleaning services to access your systems.
  • Organizations often require security audits of third-party providers in service contracts.
  • Audits help identify and address security gaps in provider networks and practices.

Real-World Example: Target Data Breach

  • In 2013, attackers accessed Target's network via an HVAC vendor using stolen VPN credentials.
  • Lack of network segmentation allowed attackers to compromise point of sale terminals across all stores.
  • Resulted in theft of 40 million credit card numbers, highlighting risks of vendor relationships.

Hardware Supply Chain Concerns

  • Devices like switches and routers may be counterfeit or compromised before installation.
  • In 2022, counterfeit Cisco devices worth $1 billion were discovered, leading to poor performance and potential risks.
  • Verifying hardware authenticity is now standard practice to prevent counterfeit or malicious devices in corporate networks.

Software Supply Chain Attacks

  • Installing software requires trust in its legitimacy, often verified by digital signatures.
  • Updates and open-source software can still be compromised if attackers inject malicious code.
  • The 2020 SolarWinds Orion breach distributed backdoored software, affecting over 18,000 organizations, including major corporations and government agencies.
  • The incident changed how organizations approach software updates and supply chain security.

Key Terms & Definitions

  • Supply Chain — The network of suppliers, manufacturers, distributors, and customers involved in producing and delivering a product or service.
  • Third-Party Provider — An external company providing goods or services to an organization.
  • Counterfeit Hardware — Unauthorized or fake equipment packaged to look like legitimate branded products.
  • Digital Signature — An electronic verification that software has not been tampered with.
  • Malware — Malicious software designed to cause harm or unauthorized access.
  • Network Segmentation — Dividing a network into separate zones to limit access and reduce security risks.

Action Items / Next Steps

  • Review service contracts to ensure audit rights for third-party providers.
  • Implement hardware verification and authentication procedures.
  • Assess and improve network segmentation to restrict vendor access.
  • Monitor software sources and use digital signatures to verify legitimacy.