{"id":1265,"date":"2024-09-22T10:11:24","date_gmt":"2024-09-22T10:11:24","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1265"},"modified":"2025-07-29T07:41:09","modified_gmt":"2025-07-29T07:41:09","slug":"breaking-the-chain-why-you-need-to-worry-about-supply-chain-hacking","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/breaking-the-chain-why-you-need-to-worry-about-supply-chain-hacking\/","title":{"rendered":"Breaking the Chain: Why You Need To Worry About Supply Chain Hacking"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"466\" height=\"350\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/chain-1.webp\" alt=\"chain\" class=\"wp-image-1266\" style=\"width:586px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>One of the most fatal mistakes an organization can make is thinking cyber attackers are the same caliber of criminal as the juvenile delinquents shoplifting and asking for cigarettes at the local mall. Sure, some hackers are just as pathetic, but these aren\u2019t the ones your business (should) need to worry about. With this in mind, for the rest of this post, let\u2019s pretend the bottom-feeders never learned how to \u2018code\u2019 (read: use google).&nbsp;<br><\/p>\n\n\n\n<p>Cyber attackers are smart. They understand how businesses operate and they place an enormous value on the intelligence they gather in preparation for an attack. There are thousands of forums where this information is shared, and some of the subject matter may surprise you \u2013 such as why cybercriminals seem to have a penchant for supply and logistics.<br><\/p>\n\n\n\n<p>Let\u2019s say you\u2019re a large multi-national and you\u2019ve just spent millions on the shiniest pieces of cyber security kit. Once installed, you might sit back in the boardroom, sipping contentedly on flat-white-with-one, smugly confident that the digital walls you\u2019ve built around your empire are completely impenetrable.<br><\/p>\n\n\n\n<p>Oh sweet summer child, you couldn\u2019t be more wrong\u2026 &nbsp;<br><\/p>\n\n\n\n<p>Not only are hackers smart, they\u2019re also economical \u2013 this is a potent combination. Cyber warfare has no rules of engagement, no concept of honour and the path of least resistance is the most favored route. &nbsp;<br><\/p>\n\n\n\n<p>Hackers know there\u2019s little point trying to attack you through the front door, especially when you\u2019ve left the back door ajar. Why would they waste the resources and effort mounting an attack against your alabaster walls when your supply chain is filled with smaller vendors who\u2019s credentials are much easier to steal \u2013 credentials that can be used to bypass your defenses.<br><\/p>\n\n\n\n<p>Attacking smaller organizations in the target business\u2019 supply chain is becoming more prevalent as the big end of town fortifies its defenses. Below are just a few examples of how this strategy has been used to devastating effect.<br><\/p>\n\n\n\n<p>In 2014, retail giant <a href=\"https:\/\/krebsonsecurity.com\/2014\/02\/target-hackers-broke-in-via-hvac-company\/\" target=\"_blank\" rel=\"noopener\">Target <\/a>was a victim of this supply chain hacking. A hacker obtained the details of 70 million customers and 40 million credit card holders by infiltrating a refrigeration and air condition supplier, then using their credentials to get to Target. This attack would have been extremely difficult to defend against as, technically, there was no actual breach. Despite this, there could have been steps taken to prevent this catastrophe; two-factor authentication is one such measure. Two-factor authentication is a procedure that requires a user verify their identity twice before accessing data or a secure location. Most commonly, it is a combination of a strong password and a unique code sent to a predetermined mobile number. This prevents hackers who get a hold of credentials from using them to access to private information as they would also need to get their hands on the mobile phone linked to those user details.<br><\/p>\n\n\n\n<p>The tactic is so successful, one group has been honing the skill since 2009. The group, <a href=\"http:\/\/www.zdnet.com\/article\/advanced-chinese-hacking-campaign-infiltrates-managed-it-service-providers-across-the-globe\/\" target=\"_blank\" rel=\"noopener\">APT10<\/a>, is a hacking collective who target third-party IT support companies, favouring phishing emails that install malware on these organization\u2019s devices. From there, APT10 masquerades as the IT company and requests information or direct access to client servers. Once established, they have easy access to the private information of whichever company they were targeting. The victim usually has no idea they have been attacked since, from their perspective, they just gave their IT service company remote access as they\u2019ve done so 100 times before.&nbsp;<br><\/p>\n\n\n\n<p>Supply chain hacking extends beyond the business world and into the realms of glitter, gossip and Grammys. In December 2016, <a href=\"https:\/\/www.nytimes.com\/2017\/05\/07\/technology\/hackers-exploit-celebrities-vendor-chains.html\" target=\"_blank\" rel=\"noopener\">hackers impersonated an executive at Interscope Records<\/a> and sent an email to September Management and Cherrytree Music Company, a music management business and record company, requesting Lady Gaga\u2019s stem files. These files are the rough draft of a song before it is edited and mastered. Just like that, the files were sent over and the hacker released them before they were supposed to come out. As you can imagine, this caused the companies to lose a lot of money.&nbsp;<br><\/p>\n\n\n\n<p>Ultimately, everyone is susceptible to supply chain hacking since it is perceived that we are sending information to someone we trust.<br><\/p>\n\n\n\n<p>There is, however, one variety of supply chain hacking that is clearly the most popular &#8211; targeting Point of Sale (POS) vendors. Hackers infiltrate these POS vendors and install malware on all their POS systems. When the POS vendor then installs these machines, they automatically send the credit card information to the hackers during each and every transaction.&nbsp;<br><\/p>\n\n\n\n<p>This was the case for<a href=\"http:\/\/www.darkreading.com\/jimmy-johns-gourmet-sandwiches-pos-systems-hacked\/d\/d-id\/1316045\" target=\"_blank\" rel=\"noopener\"> Jimmy Johns<\/a> in 2014. More than 200 Jimmy Johns restaurants were affected, with the PoS malware stealing customer credit card information. Once Jimmy Johns became aware of the situation, they immediately removed the malware, but unfortunately it was too late for many of their customers.&nbsp;<br><\/p>\n\n\n\n<p>Businesses can\u2019t afford blind trust when it comes to suppliers \u2013 as the old adage goes, it is better to be safe than sorry. For example, when getting new systems installed (such as PoS) a good idea is to have them checked for malware before being installed. It may be expensive, but the cost does not even come close to the expense of having thousands of customers\u2019 credit card information stolen.&nbsp;<br><\/p>\n\n\n\n<p>The reason supply chain hacking is common place is because it is successful. The reason it is successful, is because organizations view their defenses as a fortress and complacency\u2019s sweet embrace causes business leaders to drop their guard.&nbsp;<br><\/p>\n\n\n\n<p>By being aware of the threat, businesses can question any suspicious correspondence from suppliers and implement tools such as two-factor authentication. It\u2019s also critical to check any hardware you buy from vendors before you install them \u2013 after all, you wouldn\u2019t let a large wooden horse through your castle doors would you?&nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most fatal mistakes an organization can make is thinking cyber attackers are the same caliber of criminal as the juvenile delinquents shoplifting and asking for cigarettes at the local mall. Sure, some hackers are just as pathetic, but these aren&rsquo;t the ones your business (should) need to worry about. With this in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1266,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1265"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1265\/revisions"}],"predecessor-version":[{"id":4438,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1265\/revisions\/4438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1266"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}