Threat, Vulnerabilities and Mitigations: Supply Chain Attack Flashcards

1
Q

What is a supply-chain attack?

A

Considered a worst-case scenario, a supply-chain attack is when a threat actor infiltrates a well-used piece of software or hardware, or a service, to perpetuate an attack, often unknowingly through a conduit such as:

Managed service providers (MSPs).

Vendors.

Suppliers.

Examples of supply-chain attacks include:

SolarWinds: https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth

3CX: https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly