The US government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations by sneaking malicious code into widely used software.
The US National Counterintelligence and Security Center (NCSC) recently warned that foreign hackers are increasingly targeting vendors and suppliers that work with the government to compromise their products in an effort to steal intellectual property and carry out espionage. The NCSC said it is working with other agencies, including the Cybersecurity and Infrastructure Security Agency (CISA), to raise awareness of the supply chain issue.
April 2021 marks what authorities are describing as the fourth annual National Supply Chain Integrity Month. This year’s event comes as US federal officials deal with the aftermath of the SolarWinds intrusion, in which hackers compromised the software supply chain through malware. At least nine federal agencies were hacked, along with dozens of private-sector companies. The NCSC said it plans to issue guidance throughout the month about how specific sectors, like health care and energy, can protect themselves. “If the Covid-19 pandemic and resulting product shortages were not a sufficient wake-up call, the recent software supply chain attacks on US industry and government should serve as a resounding call to action,” NCSC acting director said in a statement. “We must enhance the resilience, diversity, and security of our supply chains. The vitality of our nation depends on it.” Other officials from the United Kingdom, Canada and Australia are participating in a Harvard University discussion about protecting the international supply chain.
The sheer number of steps in a product’s supply chain process give a hacker looking to infiltrate businesses, agencies and infrastructure numerous points of entry and can mean no company or executive bears sole responsibility for protecting an entire industry supply chain.[1]
Perhaps the best-known supply chain intrusion before SolarWinds is the NotPetya attack, in which malicious code found to have been planted by Russian military hackers was unleashed through an automatic update of Ukrainian tax preparation software, called MeDoc.
Red Sky Alliance has been has analyzing and documenting cyber threats for 9 years and maintains a resource library of malware and cyber actor reports available at https://redskyalliance.org at no charge.
What can you do to better protect your organization and supply chains today? Enroll your company/organization in Red Sky Alliance’s service, RedXray https://www.wapacklabs.com/redxray for daily cyber threat notifications are directed at your domains. RedXray services were developed to protect supply chains. Users can view cyber threats to their own entity and others, such as key suppliers and business partners. RedXray service is $500 a month and provides threat intelligence on nine (9) cyber threat categories including Keyloggers, with having to connect to your network or the networks of any member of your supply chain. Reports can be delivered daily or on-demand via email, dash boards or APIs.
Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the lab directly at 1-844-492-7225, or feedback@wapacklabs.com
Weekly Cyber Intelligence Briefings:
- Reporting: https://www.redskyalliance.org/
- Website: https://www.wapacklabs.com/
- LinkedIn: https://www.linkedin.com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://attendee.gotowebinar.com/register/3702558539639477516
[1] https://www.securityweek.com/after-hack-officials-draw-attention-supply-chain-threats
Comments