For ages, the US has been the epicenter of cybercrimes. The US government security agencies responsible for maintaining security to their system have mostly failed or unable to identify the culprit.

Talking only about last year cybersecurity and infrastructure agencies known as CISA reported that federal agencies faced 180 different threats from the digital supply chain. In recent attacks, the US department of homeland security was breached.


Nothing new in this cyber warfare world ransomware is the malware that when goes inside a system it encrypts the system data and after which demand ransom in form of money or something to decrypt the data. The hacker’s group target local government body, health care systems, etc. billions of rupees and important data and time are lost in the whole process. One such way hackers gain access is via the increased use of personal devices to access business data. Kenny Natiss notes that using personal devices can leave companies at risk of cyber threats and leave data unsecured ready to fall into the wrong hands.


 A supply chain attack also called a value-chain or third-party attack occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data.

The instability of the world was the main reason for this many cyber-attacks. In the year 2019 people came to the most dangerous mode of large-scale cyber-attack which is called a supply chain attack.

This cyber warfare is very different from the conventional methods of cyber-attacks because here the breach occurs in partnership with a service provider.

The hackers have recently developed new toots and resources making it impossible to prevent it and the loss in this is also very high. Mostly it occurs in 2 steps firstly an update is released from a legitimate software vendor and after the users’ download it thinking it to be trustworthy, but it turns out to be the destructive one that beaches the system.

One of the recent times cases is the solar wind attack that compromised beach in 18000 customers. This happened because the hackers were able to get inside an update of the company which the users installed only to get their data destroyed. The compromised update cost the company billions of rupees.

 This solar winds supply chain attack was a seismic hit to the US government but was not the first one to do so. Many cyber supply chain attacks have been occurring in the US mainly from countries like Russia, China, Iran, North Korea. But exact location is difficult to detect due to sophistication.

This attack also proved that every company either it is big or small is vulnerable to this method of cybercrime. Any cyber company is a potential target. Even Google and Microsoft are not safe.

Supply chain attacks mainly target open-source code and 90% of all applications have open source codes and from them 11%has known vulnerabilities in them.

Four federal agencies – the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) – issued a joint statement saying that the SolarWinds attack was “likely Russian in origin.

The government watchdogs also released a statement that the threats are far from new and the government has merely failed in implementing security measures for their sensitive information against supply chains.

 One report by the US government agency reveals that 14 out of 23 surveyed federal agencies have either no or very little security to protect their information and communication from the supply chain.

To prevent this type of attack necessary steps should be taken which includes proper encoding of information, also the service providers must be of the same country and verified. The service provider also must ensure proper security to ensure safety. A different world organization should be formed In the UN which will only deal with the matter related to cybersecurity with the active participation of every country.


“Next Generation Cyber Attacks Target Oil And Gas SCADA | Pipeline & Gas Journal”. Retrieved 27 October 2015.

 “New malware hits ATM and electronic ticketing machines”. SC Magazine UK. Retrieved 29 October 2015.

 Urciuoli, L., Männistö, T., Hintsa, J., & Khan, T. (2013). SUPPLY CHAIN CYBERSECURITY – POTENTIAL THREATS. Information & Security, 29(1), 51-68. Retrieved 2015-10-29


Share on facebook
Share on twitter
Share on linkedin

36 Responses

  1. Pingback:
  2. I’m really enjoying the theme/design of your website.
    Do you ever run into any internet browser compatibility problems?
    A handful of my blog readers have complained about my site not operating correctly in Explorer but looks great in Opera.
    Do you have any recommendations to help fix this issue?

    1. Yes, Internet Explorer is having some issues. Compatibility issues are also there.

  3. My spouse and I stumbled over here from a different website and thought
    I may as well check things out. I like what I see so i am just following you.
    Look forward to looking into your web page for a second time.

    1. Thanks a lot. Don’t forget to Register on our website. You can also download apk file.

      1. Thanks a lot. Don’t forget to Register on our website. You can also download apk file.

        1. Thanks a lot. Don’t forget to Register on our website. You can also download apk file.

  4. It is in reality a great and helpful piece of information. I am glad that you simply shared this helpful information with us.
    Please stay us up to date like this. Thanks for sharing.

    1. Thanks a lot. Don’t forget to Register on our website. You can also download apk file.

  5. Admiring the time and effort you put into your site
    and detailed information you offer. It’s awesome to come across a blog every once in a while
    that isn’t the same outdated rehashed material. Great read!
    I’ve bookmarked your site and I’m including your RSS feeds
    to my Google account.

  6. [url=]cash loans uk[/url] [url=]cash loan fast[/url] [url=]loan fast[/url] [url=]guarantor loans[/url] [url=]loans online direct[/url] [url=]fast cash loans[/url] [url=]loans for used cars[/url] [url=]cash fast online[/url] [url=]loans without a credit check[/url] [url=]personal loan rates comparison[/url]

  7. Usually I don’t read article on blogs, however I would like to
    say that this write-up very pressured me to try and do it!
    Your writing taste has been surprised me. Thanks, quite great post.

  8. Having read this I believed it was really informative.
    I appreciate you finding the time and effort to put this
    content together. I once again find myself spending way too
    much time both reading and posting comments.
    But so what, it was still worth it!

  9. Türkiyenin en iyi leke kremi
    satış sitesini ziyaret ettiniz mi? en iyi leke cilt bakım setleri için sitemizi mutlaka
    ziyaret ederek leke kremi hakkında bilgi sahibi

  10. Link exchange is nothing else but it is just placing the other person’s blog link on your page
    at appropriate place and other person will also do similar for you.

  11. A person necessarily help to make critically posts I would state.

    That is the very first time I frequented your website page and up to now?
    I amazed with the research you made to create this particular submit incredible.

    Magnificent activity!

    1. Thanks a lot. Don’t forget to Register on our website. You can also download apk file.

  12. Having read this I thought it was really enlightening. I appreciate you taking the time and energy to put this short article together. I once again find myself spending a lot of time both reading and commenting. But so what, it was still worthwhile. Hali Farleigh Settera

  13. I blog frequently and I really thank you for your information. The article has really peaked my interest. I am going to book mark your site and keep checking for new details about once per week. I opted in for your RSS feed as well. Ralina Ximenez Harli

  14. This is really interesting, You are a very skilled blogger.
    I have joined your rss feed and look forward to seeking more of your great post.

    Also, I’ve shared your site in my social networks!

  15. Thanks alot for your comment

  16. Everyone loves it when individuals come together and share ideas.
    Great website, keep it up!

    1. Soon we will come up with a new whole idea where people can come and share their views on any topic.

  17. Hello there! This post could not be written any better!
    Reading through this post reminds me of my old room mate!
    He always kept talking about this. I will forward this page to him.
    Pretty sure he will have a good read. Thank you for sharing!

    1. We appreciate that you find our articles worth reading and sharing, keep supporting us.

  18. Nice blog! Is your theme custom made or did you download it from somewhere?

    A design like yours with a few simple tweeks
    would really make my blog jump out. Please let me know where you got your
    design. With thanks

    1. Custom made but you can download themes directly, these are very good to go and easy to use.

  19. Definitely believe that which you stated. Your favorite reason appeared to be on the
    internet the simplest thing to be aware of. I say to you, I
    certainly get irked while people think about worries that they just do not know
    about. You managed to hit the nail upon the top and defined out the whole thing without having
    side effect , people can take a signal. Will
    likely be back to get more. Thanks

    1. Thank you so much. Your encouraging words give us more power, keep supporting us.

  20. writetoanuz says:

    REFERENCES will help a lot for researchers !!
    Kudos Team!!

Leave a Reply

Your email address will not be published.