Hunt & Hackettโ€™s Post

View organization page for Hunt & Hackett, graphic

4,323 followers

๐‡๐จ๐ฐ ๐ญ๐จ ๐ง๐š๐ฏ๐ข๐ ๐š๐ญ๐ž ๐ญ๐ก๐ž ๐ซ๐ข๐ฌ๐ข๐ง๐  ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐จ๐Ÿ ๐ฌ๐ฎ๐ฉ๐ฉ๐ฅ๐ฒ ๐œ๐ก๐š๐ข๐ง ๐š๐ญ๐ญ๐š๐œ๐ค๐ฌ In the past five years, supply chain attacks have tripled, with a notable surge since 2021, according to Cybersecurity Magazine (CSM). These attacks involve malicious actorsย targeting third-party vendors who offer services or software necessary to an organization's operations. While SolarWinds stands out as a prominent example, recent incidents like the #Snowflake and #Polyfill.io attacks highlight the ongoing threat. The Snowflake cloud-based data warehouse attack involved cyberattacks on customer environments due to compromised login credentials. This breach has been linked to significant data breaches at #Ticketmaster, #SantanderBank, and more. Attackers used credentials stolen through historical infostealer malware infections, affecting at least 100 Snowflake customers and exposing approximately 165 businesses, as reported by Mandiant (part of Google Cloud). The impact was worsened by poor security practices, such as not updating credentials or using multifactor authentication. Polyfill.io, a widely used #JavaScript CDN service, was compromised earlier this year after being acquired by a Chinese company called Funnull. This led to malicious JavaScript code being injected into over 100,000 websites, redirecting mobile visitors to scam sites, according to Dark Reading. The full extent of the consequences is still unclear, but major names like #Intuit and the #WorldEconomicForum were affected. Key Learnings:ย  ๐Ÿ‘‰ Regularly update login credentials and use multifactor authentication ๐Ÿ‘‰ Monitor third-party services and dependencies for changes in ownership or security status ๐Ÿ‘‰ Implement robust security practices and educate teams about the risks of supply chain attacks ๐Ÿ‘‰ Use threat detection tools to identify and mitigate potential breaches early To delve deeper into how your organisation can leverage #detection methods to identify #supplychain attacks, check out our blog on detecting and preventing targeted attacks: ย https://lnkd.in/eZVjMXcZ

Detecting targeted attacks: The 'Detect the Undetectable' paradox

Detecting targeted attacks: The 'Detect the Undetectable' paradox

huntandhackett.com

See more comments

To view or add a comment, sign in

Explore topics