Information Assurance - 2 Flashcards
type of cyberattack that targets a trusted third-party vendor who offers services or software vital to the supply chain.
SUPPLY CHAIN ATTACK
ATTACKS CAN TAKE VARIOUS FORMS
- SOFTWARE SUPPLY CHAIN ATTACKS
- HARDWARE SUPPLY CHAIN ATTACKS
- SERVICE PROVIDER COMPROMISE
cyberattack that targets the weakest link in the interconnected chain of entities involved in producing, distributing, and maintaining goods or services
supply chain attack
Attackers compromise software vendors or open-source projects to inject malicious code into legitimate software updates or packages. When users download and install these updates, they inadvertently install the malware onto their systems
SOFTWARE SUPPLY CHAIN ATTACKS
Attackers tamper with hardware components during the manufacturing process or supply chain distribution, introducing backdoors, spyware, or other malicious functionality into the devices. These compromised hardware components are then sold to unsuspecting customers, allowing attackers to gain unauthorized access to their systems
HARDWARE SUPPLY CHAIN ATTACKS
WHAT DO SUPPLY CHAIN ATTACKS DO
The goal of a supply chain attack is to infiltrate and disrupt a weak point of a system within an organization’s supply chain with the intent to cause harm
Attackers compromise third-party service providers, such as cloud providers, managed service providers, or IT vendors, to gain access to their customers’ networks. Once inside, they can move laterally and escalate privileges to carry out further attacks.
SERVICE PROVIDER COMPROMISE
exploit weaknesses which typically third parties that are considered to have the weakest cybersecurity
Supply chain attacks
COMMON TYPES OF SUPPLY CHAIN ATTACKS
- BROWSER-BASED ATTACKS
- SOFTWARE ATTACKS
- OPEN-SOURCE ATTACKS
- JAVASCRIPT ATTACKS
- WATERING HOLE ATTACKS
- MAGECART ATTACKS
- CRYPTOJACKING
Run malicious code on end-user browsers. Attackers may target JavaScript libraries or browser extensions that automatically execute code on user devices.
BROWSER-BASED ATTACKS
Exploit vulnerabilities in open-source code
OPEN-SOURCE ATTACKS
Disguise malware in software updates
SOFTWARE ATTACKS
Exploit existing vulnerabilities in JavaScript code or embed malicious scripts in webpages that automatically execute when loaded by a user
JAVASCRIPT ATTACKS
Identify websites that are commonly used by a large number of users (e.g. a website builder or government website).
WATERING HOLE ATTACKS
Use malicious JavaScript code to skim credit card information from website checkout forms, which are often managed by third parties.
MAGECART ATTACKS