Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The Anatomy of a Supply Chain Cyberattack

By Brian Schmitt and Abeer Abu Judeh
June 01, 2022

Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years. Indeed, it was not until the April 2021 compromise of SolarWinds software that led to a swath of intrusions across government entities and various industries that attacks on supply chain networks became a common concern within the C-Suite. The heightened threat to distribution networks compelled attorneys, among other professionals, to rethink how best to protect existing infrastructure and allocate risks. This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

|

Anatomy of a Supply Chain Cyberattack 

Unlike typical cyberattacks, a supply chain infiltration requires more sophistication and patience than a script kiddie, phishing scam, or brute force attack. However, while it is still possible that a supply chain cyberattack may commence as a typical phishing scam, the sophistication of a supply chain infiltration comes into play after the initial intrusion. To successfully execute this type of attack, the actor must remain undetected in the organization's technology infrastructure and move across different software to access the systems where the victim's data or code resides. The level of sophistication required to stay hidden, combined with the prolonged waiting periods while surveying the systems and devising a compromise plan, leads to the inevitable conclusion that a nation-state actor often conducts such attacks.

An actor's restraint from arising suspicion while persistently accessing a vendor's software product over an extended period has its rewards. Disguised as legitimate software traffic, the actor gains entry to prospective victims' systems running the impacted version of the compromised product. The actor has now infiltrated a new host organization by leveraging the initial compromise, potentially leading to additional victims. And the value of this technique is not sheer volume. It essentially converts legitimate software into an unintended Trojan Horse by which the actor bypasses well-designed security protocols. In the case of SolarWinds, it was cybersecurity firm FireEye's investigation of its compromise that identified the backdoor built into SolarWinds' product. Here, the biggest challenge for the attacker is not the sophistication of the security defenses but the length of time before the compromise is widely detected. It is also worth noting that victims using the compromised software who do not sustain significant breaches likely evaded such fate simply because the attacker had prioritized other targets.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.