-By Rohan Purohit
For ages, the US has been the epicenter of cybercrimes. The US government security agencies responsible for maintaining security to their system have mostly failed or unable to identify the culprit.
Talking only about last year cybersecurity and infrastructure agencies known as CISA reported that federal agencies faced 180 different threats from the digital supply chain. In recent attacks, the US department of homeland security was breached.
Nothing new in this cyber warfare world ransomware is the malware that when goes inside a system it encrypts the system data and after which demand ransom in form of money or something to decrypt the data. The hacker’s group target local government body, health care systems, etc. billions of rupees and important data and time are lost in the whole process.
SUPPLY CHAIN ATTACK
A supply chain attack also called a value-chain or third-party attack occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.
The instability of the world was the main reason for this many cyber-attacks. In the year 2019 people came to the most dangerous mode of large-scale cyber-attack which is called a supply chain attack.
This cyber warfare is very different from the conventional methods of cyber-attacks because here the breach occurs in partnership with a service provider.
The hackers have recently developed new toots and resources making it impossible to prevent it and the loss in this is also very high. Mostly it occurs in 2 steps firstly an update is released from a legitimate software vendor and after the users’ download it thinking it to be trustworthy, but it turns out to be the destructive one that beaches the system.
One of the recent times cases is the solar wind attack that compromised beach in 18000 customers. This happened because the hackers were able to get inside an update of the company which the users installed only to get their data destroyed. The compromised update cost the company billions of rupees.
This solar winds supply chain attack was a seismic hit to the US government but was not the first one to do so. Many cyber supply chain attacks have been occurring in the US mainly from countries like Russia, China, Iran, North Korea. But exact location is difficult to detect due to sophistication.
This attack also proved that every company either it is big or small is vulnerable to this method of cybercrime. Any cyber company is a potential target. Even Google and Microsoft are not safe.
Supply chain attacks mainly target open-source code and 90% of all applications have open source codes and from them 11%has known vulnerabilities in them.
Four federal agencies – the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) – issued a joint statement saying that the SolarWinds attack was “likely Russian in origin.
The government watchdogs also released a statement that the threats are far from new and the government has merely failed in implementing security measures for their sensitive information against supply chains.
One report by the US government agency reveals that 14 out of 23 surveyed federal agencies have either no or very little security to protect their information and communication from the supply chain.
To prevent this type of attack necessary steps should be taken which includes proper encoding of information, also the service providers must be of the same country and verified. The service provider also must ensure proper security to ensure safety. A different world organization should be formed In the UN which will only deal with the matter related to cybersecurity with the active participation of every country.
“Next Generation Cyber Attacks Target Oil And Gas SCADA | Pipeline & Gas Journal”. www.pipelineandgasjournal.com. Retrieved 27 October 2015.
“New malware hits ATM and electronic ticketing machines”. SC Magazine UK. Retrieved 29 October 2015.
Urciuoli, L., Männistö, T., Hintsa, J., & Khan, T. (2013). SUPPLY CHAIN CYBERSECURITY – POTENTIAL THREATS. Information & Security, 29(1), 51-68. Retrieved 2015-10-29