Threat, Vulnerabilities and Mitigations: Supply Chain Attack Flashcards
1
Q
What is a supply-chain attack?
A
Considered a worst-case scenario, a supply-chain attack is when a threat actor infiltrates a well-used piece of software or hardware, or a service, to perpetuate an attack, often unknowingly through a conduit such as:
Managed service providers (MSPs).
Vendors.
Suppliers.
Examples of supply-chain attacks include:
SolarWinds: https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth
3CX: https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/