Supply chain attacks
Skillmine Technology Consulting
We shape your business for tomorrow!
In the realm of cybersecurity, the emergence of supply chain attacks presents a significant concern for businesses. This form of attack follows a two- step process first, the attacker compromises a supplier, exercising their access to launch an attack on the ultimate target with the thing of seizing control over it coffers.
Whether targeting end consumers or other suppliers within the chain, an incident qualifies as a supply chain attack only when both the supplier and the client are affected. This underscores the complex and connected nature of digital pitfalls and emphasizes the need for alert across all situations of the supply chain to ensure robust security.
These attacks are particularly insidious because they exploit the established trust between associations and their suppliers, posing significant challenges in terms of discovery and mitigation. The attack techniques refer to "how" the attack took place, and not "what" was used to attack. For instance, this category discerns whether the supplier faced an attack where the password was obtained online (OSINT) or if it was subjected to a brute-force attack. However, it is not relevant for the taxonomy whether the password found online was leaked, a default password or sold in a black market.
The Attack Techniques categories listed below encompass the most frequently employed methods in the analyzed supply chain attacks. It's clear that multiple techniques might have been employed in each attack, and in some instances, entities may lack knowledge regarding how attackers accessed their infrastructure, or such information wasn't disclosed or properly reported.
Sources of Supply Chain Attacks
In the maze of supply chain vulnerabilities, adversaries frequently exploit familiar routes similar as marketable software, open - source supply chains, and foreign products to carry their attacks.
Attack Ways Used to Compromise a Supply Chain
领英推荐
Customer assets targeted by a supply chain attack
Examples of recent supply chain attacks
To manage supply chain cybersecurity threat, guests should:
Subscribe to our newsletters. Visit Skillmine website to learn more.