Remediation of the fallout from the massive breach of SolarWinds network management tools which affected up to 18,000 organizations could cost companies billions.
In the breach, the attackers were able to compromise the update process of a widely used piece of SolarWinds software. In cybersecurity circles, this is referred to as a supply chain attack an especially devastating variety of cyber aggression. By compromising just one vendor, attackers may get access to all the vendors customers.
Related: The List of Known SolarWinds Breach Victims Grows, as Do Attack Vectors
US national security costs could also be significant, since the list of breached IT organizations included those of the Pentagon, the Department of State, and the Department of Homeland Security.
Four federal agencies the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) issued a joint statement saying that the SolarWinds attack was "likely Russian in origin."
Related: What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability
SolarWinds may be a seismic event in government cybersecurity, but it's not the first major supply chain attack we've seen. And its not the first one Russia has launched on a global basis.
In 2017, Russian actors compromised Ukrainian accounting software as part of an attack designed to target the country's infrastructure, but the malware spread quickly to other countries. NotPetya wound up doing more than $10 billion in damage and disrupted operations for multinational corporations such as Maersk, FedEx, and Merck.
Any tech company is a potential target. Nation state actors have the deep resources and skill sets necessary for supply chain attacks, able to penetrate even the most security-conscious firms.
Even security vendors can be targets. In the SolarWinds case, one of the higher-profile companies breached was FireEye, one of the most well-known cybersecurity vendors. FireEye said the attackers didn't get into customer-facing systems, and that they only got access to penetration tools used for security testing. But the fact that a company like FireEye got hit at all is worrisome.
Another example came in November 2020, when another leading cyber security company, Sophos, suffered a data breach that exposed some sensitive customer information.
This fall, security vendor Immuniweb said in a research report that 97 percent of the world's top 400 cybersecurity companies had data leaks or other security incidents exposed on the dark web and that 91 companies had exploitable website security vulnerabilities.
Supply chain attacks aren't a recent development. In 2011, RSA Security admitted that its SecurID tokens were hacked. One of its customers, Lockheed Martin, was attacked as a result.
If these vendors are potentially vulnerable, every vendor is.
Attacks like the SolarWinds one, which compromise commercial software vendors, are one of three types of supply chain attacks. The other categories are attacks on open source software projects and direct interference by nation states in the products their domestic vendors make (such as Chinas alleged leveraging of Huaweis global install base).
According to Sonatype's 2020 State of the Software Supply Chain report, supply chain attacks targeting open source software projects are a major issue for enterprises, since 90 percent of all applications contain open source code and 11 percent of those have known vulnerabilities.
For example, in the 2017 Equifax breach, which the company said cost it nearly $2 billion, attackers took advantage of an unpatched Apache Struts vulnerability.
And 21 percent of companies said they had experienced an open source-related breach in the previous 12 months.
But attackers don't have to wait around for a vulnerability to surface in open source software. Over the last few years, they've begun creating their own vulnerabilities, deliberately compromising the open source development and distribution process. It's been effective.
According to the Sonatype survey, these kinds of next-generation attacks increased 430 percent over the previous year.
Why bother to hack into a software company when you can just order it to install malware in its products?
That's not so much of an option for Russia, not a major technology exporter. For China, it is.
"Compromised electronics in US military, government and critical civilian platforms give China potential backdoors to compromise these systems," said US Senators Mike Crapo (R-Idaho) and Mark Warner (D-Virginia) in a statement announcing the bipartisan 2019 MICROCHIPS act.
"Almost all nation states, industries, and enterprises are overexposed to, for example, China and other low-cost supply sub-chains," said Steve Wilson, VP and principal analyst at Constellation Research.
The interconnectedness of software is impossible to unravel, he told DCK. "You should be wary of third-party providers."
So, what can data center security managers do?
"The harsh reality is that the state of our software supply chain is mediocre at best, partially due to the overwhelming complexity of the software supply chain itself," said Liz Miller, VP and principal analyst at Constellation.
But there are some steps that companies can take, she told DCK.
To start with, they can ask their technology vendors for a "bill of materials that lists all the code components that they use, she said. This can help identify potential vulnerabilities related to open source component vulnerabilities.
"Organizations with high aversion to risk can consider the additional step of conducting a code audit prior to implementation," she said. One tool that helps companies do that is Synopsys' Black Duck, she said.
One lesson data centers should not take away from the SolarWinds breach is that installing supplier patches is a bad idea.
The attack did compromise the automated software update system, but it's a lot more dangerous to leave known vulnerabilities in your systems, said Tsvi Korren, field CTO at Aqua Security. "It requires some painstaking work to compromise the internal systems of a company," he said.
By comparison, exploiting a known vulnerability is quick, easy, and appealing to attackers of all ability levels. "Leaving vulnerabilities out there is something we want to avoid," Korren told DCK.
Security managers can ask their vendors for some assurances, however. "It's reasonable to demand to know what their internal chain of custody is," he said. "How do they ensure the integrity of their process all the way from writing a line of code to the packaging and distribution?"
Unfortunately, there's no industry standard that specifically covers security of vendors software development process, he said. "But I could see a set of standards emerging that come out of this incident, and that would be a good thing."
An organization working on this task is the Consortium for Information and Software Quality, a special interest group under the technology standards body Object Management Group.
"One of the standards we're working on is a software bill of materials," said executive director Bill Curtis. "It will tell you if there are known vulnerabilities." It's expected to be released in the spring, he said.
Curtis suggested that software buyers ask their vendors to audit their software for vulnerabilities. "Most vendors won't like that idea and will fight it," he said.
A lot of the work is being driven by the federal government, he said.
"The Department of Defense has gotten royally fed up with secrets being stolen for our weapons," he said. "They realized that the problem is in the supply chain. One of the contractors that's weak gets penetrated, and they'll work their way up the supply chain."
The defense sector is already asking for more from their software suppliers, said Joe McMann, CSO and cyber strategy lead at Capgemini North America.
The defense sector is mandating the Cyber Maturity Model Certification, he said.
Shimon Oren, VP of research at Deep Instinct, said data centers can also ask their vendors if they have SOC-2 certification, where outside auditors check if a vendor has adequate security in place. And there is also an ISO standard specifically focused on software development.
"Software vendors that have those two are more likely to be better protected in general," he told DCK, though it's no guarantee. "It doesn't make them immune."
It may be too late to save the business, but SolarWinds is now going to implement some of the security practices that experts are recommending customers start asking for.
In a statement, incoming CEO Sudhakar Ramakrishna promised that the company is beefing up its security controls, with a particular focus on software development environments, resetting all user credentials and enforcing multi-factor authentication.
SolarWinds will also add more automated and manual checks to make sure that compiled releases match the source code, expand its vulnerability management program, and perform penetration testing on its software using third-party tools to analyze source code for vulnerabilities.
These are all steps that every software vendor should take, before they become the next SolarWinds.
Go here to see the original:
What are Supply Chain Attacks, and How to Guard Against Them - Data Center Knowledge
- Wyplay’s Digital TV Middleware Source Code is Now Available to Members of the Frog by Wyplay Community [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Find Open Source Alternatives to commercial software | Open ... [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Open Source Initiative - Official Site [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- SCALE 11x: Evolution of an Open Source Software Foundation - Stephen Walli - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Bitcoin Baron Keeps a Secretive Open Source OS Alive [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- osalt.com - Find Open Source Alternatives to commercial ... [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Sustainability of Open Source software communities beyond a fork - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Bringing MoreWomen to Free and Open Source Software - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Acquia podcast with Sensio Labs UK - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- xTuple ERP + OrangeHRM Open source software leaders integration - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Guest articles setting out the author's position on the current status and future directions of KDE and its software [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Open Source Power for Small Business in 2014 [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- EnterpriseDB Expands in Korea to Meet Rising Demand for Postgres [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Introduction to FOSS - Free and Open Source Software - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Out in the Open: Teenage Hacker Transforms Web Into One Giant Bitcoin Network [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Who says that Open Source Software does not have support? By Rosaria Silipo - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Microsoft Open Sources Its Internet Servers, Steps Into the Future [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Microsoft cloud server designs for Facebook's Open Compute Project [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Richard Stallman Free v Open Source Software - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- UK government looks to open source to cut costs [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Free Software + $20 USB Dongle = Software Defined Radio, Hak5 1524 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Libreoffice 4.2 challenges Microsoft Office with improved Windows integration [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Fallout 3 Let's Play Pt 6 - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- 14 1 29 Tom G Open Source Software 1 - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- 14 1 29 Tom G Open Source Software - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- How is open source software like great wine? - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Free and open source software key for multicore hardware [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Blender Tutorial - 2D Animation (1) Bone Rigging, Shape Character Planes by VscorpianC - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Obama Bit Coin Conspiracy? - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- The Pentagon's Mad Science Is Going Open Source [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- The open source countdown has begun [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- BLOG: Why open source will rule the data centre [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- OpenDaylight Summit: SDN Needs Open Source and Open Standards [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- 7 reasons not to use open source software [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- The Open Source Initiative | Open Source Initiative [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Find Open Source Alternatives to commercial software ... [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Has Linux Conquered the Cloud? [Last Updated On: February 13th, 2014] [Originally Added On: February 13th, 2014]
- The New eRacks/NAS36 Rackmount Storage Server Achieves Price/Density Breakthrough: 100TB Storage in Only 4U for Under ... [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 2012 Red Hat Summit Build a PaaS using Open Source Software ~ Redhat Linux Video YouTube - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Intel launches big data software suite - free to a good home [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Three college students build a health provider search site in six weeks [Last Updated On: February 16th, 2014] [Originally Added On: February 16th, 2014]
- The Asgard Show Episode 6 - Video [Last Updated On: February 16th, 2014] [Originally Added On: February 16th, 2014]
- Open source startups: Don't try to be Red Hat [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Open Source in the Enterprise: To Pay or Not to Pay? [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- DEF CON 12 - Wendy Seltzer and Seth Schoen, Hacking the Spectrum - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- dev@Pulse Speaker Predictions - Jonathan Bryce - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Facebook Boosts Its Open Source Mojo With New Project [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Raising Linux to Grow Open Source [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Apple Veteran Named PayPal's First Head of Open Source Software [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Open Source Software | 46 of 62 | MconneX - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- News Flash from Redmond: FOSS Causes Dissatisfaction! [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- FOSS4G with Eric Brelsford - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- NYLUG Presents: Mark Tolliver on Palamida. Application Security for Open Source Software (6/25/08) - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DARPA Open Catalog Makes Agency-Sponsored Software and Publications Available to All [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Munich opts for open source groupware from Kolab [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Modelling Hands Step by Step Using Free Open Source Software Seamless3d 3 - Video [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Accelerating the Network with Open Source Software, Erik Ekudden | OpenDaylight Summit 2014 - Video [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- The Commercial Case for Open Source Software [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- Beginners guide to contributing to open source software - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Free Open Source Software [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Open Source Software - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Open Source Software EDTC5325 - Video [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Broadcom Announces Open Switch Pipeline Specification Targeting Growing SDN Application Ecosystem [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- RIT launches nation’s first minor in free and open source software and free culture [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Forum created to push optical SDNs [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- Google embraces open source for 10th year of Summer of Code [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- Is Open Source Software The Answer to Oregon's IT Problems? [Last Updated On: March 11th, 2014] [Originally Added On: March 11th, 2014]
- Spenden Ticketautomat mit Open Source Software auf der CeBIT 2014, CMS Garden - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- 2012 Red Hat Summit Build a PaaS using Open Source Software - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- CyanogenMod receiving Linux New Media Award 2014 (Best Open Source Software App for Android) - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Real tech 25 Finding open source software you can trust - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- MailPile is now in Alpha [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- $2,400 “Introduction to Linux” course will be free and online this summer [Last Updated On: April 10th, 2017] [Originally Added On: March 16th, 2014]
- Linaro announces MediaTek as member [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- TN state departments asked to switch over to open source software [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- Open source project builds mobile networks without big carriers [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- Your U.S. government uses open source software, and loves it [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- Linux Goes to the Head of the Class [Last Updated On: March 22nd, 2014] [Originally Added On: March 22nd, 2014]
- What is open source? - Definition from WhatIs.com [Last Updated On: March 23rd, 2014] [Originally Added On: March 23rd, 2014]