Home / Chroniques / Why are cyber attackers targeting supply chains?
A laptop screen glows with an ominous red warning sign, casting a stark shadow in a dimly lit room, serving as a stark reminder of the ever-present threat of cyberattacks in our increasingly connected world
Généré par l'IA / Generated using AI
π Digital π Industry

Why are cyber attackers targeting supply chains?

Badis Hammi
Badis Hammi
Associate Professor at Télécom SudParis (IP Paris)
H1_London_044 (2)
Roni Carta
Ethical Hacker and Founder of Lupin & Holmes
Key takeaways
  • The number of phishing attacks tripled between 2020 and 2021, reaching a record high in 2023, when the Anti-Phishing Working Group recorded nearly 5 million attacks.
  • Attacks on the digital supply chain represent a real threat to IT security.
  • They can exploit an organisation’s network of partners to target it, thus multiplying the possible attack surface.
  • Developers frequently use pieces of code that are freely available on the Internet, allowing hackers to exploit software vulnerabilities.
  • To counter this, ethical hackers carry out voluntary intrusions to identify network and infrastructure vulnerabilities in general.

Some reflex­es are start­ing to kick in. An email offers us a sus­pi­cious link redi­rect­ing us to a page where we have to fill in our login details? We smell the trap of a phish­ing attack, and we don’t click. An SMS to change the deliv­ery address of a par­cel? Delet­ed before it’s even been read! How­ev­er, this has not pre­vent­ed the num­ber of phish­ing attacks from tripling between 2020 and 20211, until the record year of 2023 when the APWG (Anti-Phish­ing Work­ing Group) record­ed “almost 5 mil­lion attacks”.

How­ev­er, this is not the most wor­ry­ing aspect. Because while cyber­crim­i­nals con­tin­ue to exploit human weak­ness­es to gain access to bank accounts or sen­si­tive com­pa­ny data, anoth­er threat is loom­ing in the shad­ows, still large­ly unknown to the gen­er­al pub­lic: attacks on the dig­i­tal sup­ply chain (DSC).

Industry 4.0

Instead of tar­get­ing an organ­i­sa­tion through a sin­gle indi­vid­ual, it is now more com­mon to use the organisation’s net­work of part­ners. “It is dif­fi­cult to attack a com­pa­ny like Air­bus head-on, for exam­ple,” explains Badis Ham­mi, cyber­se­cu­ri­ty researcher and lec­tur­er at IP Paris. “But it is pos­si­ble to tar­get a small­er ser­vice provider that is vital to the com­pa­ny, such as Rolls-Royce, which man­u­fac­tures engines for Air­bus air­craft.” These ser­vice com­pa­nies are in fact inte­grat­ed into a dig­i­tal fab­ric that over­laps the clas­sic pro­duc­tion chain (sup­pli­ers, fac­to­ries, dis­trib­u­tors, sell­ers, con­sumers, etc.): this is the famous dig­i­tal sup­ply chain. Ran­somware in one of the links in this chain is enough to paral­yse the multi­na­tion­al that coor­di­nates the whole process. But the dan­ger goes even further.

“In today’s Indus­try 4.0, every­thing is con­nect­ed and can be man­aged remote­ly via the Inter­net. For exam­ple, the robot­ic arms that build cars… This con­sid­er­ably increas­es the poten­tial cyber­at­tack sur­face! One virus on a machine’s soft­ware, and the fac­to­ry comes to a stand­still,” explains the researcher. But what makes this soft­ware so vulnerable?

Open-source building blocks

To under­stand this, we need to go back to com­put­er code. Devel­op­ers fre­quent­ly use pieces of code that are freely avail­able on the Inter­net. “There are open-source libraries where you can import the code, equiv­a­lent to copy and past­ing it,” explains Badis Ham­mi2. These “build­ing blocks” are then assem­bled togeth­er to build the plat­form, or the soft­ware adapt­ed to the com­pa­ny. “The great advan­tage of open source is that it can be ver­i­fied by the online com­mu­ni­ty, which is very atten­tive,” the researcher warns. “But this also means that vul­ner­a­bil­i­ties can creep in.”

Vul­ner­a­bil­i­ties or back­doors that allow hack­ers to access the data cir­cu­lat­ing in the soft­ware. This is the night­mare sce­nario expe­ri­enced in 2020 by thou­sands of organ­i­sa­tions around the world, vic­tims of one of the biggest cyber­at­tacks on the soft­ware sup­ply chain: the Solar­Winds attack3. In Sep­tem­ber 2019, hack­ers inject­ed mali­cious code (called Sun­burst) into the Ori­on soft­ware devel­oped by Solar­Winds. Then they patient­ly wait­ed for the Amer­i­can com­pa­ny to offer the Ori­on update to their cus­tomers… unknow­ing­ly con­tain­ing the cor­rupt­ed code. Near­ly 18,000 organ­i­sa­tions world­wide were affect­ed, includ­ing the US fed­er­al gov­ern­ment itself, as Ori­on soft­ware is used in insti­tu­tions such as the Pen­ta­gon, the armed forces, var­i­ous min­istries and the FBI.

Spotting the backdoors

This mali­cious code did indeed con­tain a back­door, in direct com­mu­ni­ca­tion with the hack­ers’ servers. “If we use the metaphor of a par­cel, it’s as if the deliv­ery truck had been hijacked or, worse still, the con­tents of the par­cel had been changed into some­thing mali­cious,” explains Roni Car­ta, eth­i­cal hack­er and co-founder of Lupin & Holmes, which offers cyber­se­cu­ri­ty solu­tions for the soft­ware sup­ply chain.

“Where it gets com­plex is that open-source code can use oth­er open source codes. So, you have to imag­ine a spider’s web of pos­si­ble entry points for hack­ers,” adds Roni Car­ta, whose job is essen­tial­ly to detect these flaws before they fall into the wrong hands. “Some­times, hack­ing is sim­ply done by steal­ing access to the devel­op­ers’ own accounts. For exam­ple, those who make their code bricks acces­si­ble in open-source libraries. It hap­pened very recent­ly, and the own­er was warned that his account was vulnerable.”

So how can you pro­tect your­self from attacks? By prac­tis­ing how to thwart them. “Nowa­days, we final­ly teach “eth­i­cal hack­ing”, what is known as the “red team”,” states Badis Ham­mi. “These are “pen­testers”, peo­ple who delib­er­ate­ly car­ry out intru­sions to find flaws in net­works and infra­struc­tures in gen­er­al.” Roni Car­ta is try­ing to auto­mate this work by cre­at­ing Dépi, a soft­ware pro­gramme for detect­ing flaws in the soft­ware sup­ply chain, intend­ed for com­pa­nies. For Badis Ham­mi, it is above all nec­es­sary to keep an eye on things and keep in mind that for every thou­sand lines of code or so, there is a poten­tial flaw. In short, we have not fin­ished devel­op­ing our good cyber­se­cu­ri­ty reflexes.

Sophie Podevin
12021 Phish­ing Attacks Report: https://​docs​.apwg​.org/​r​e​p​o​r​t​s​/​a​p​w​g​_​t​r​e​n​d​s​_​r​e​p​o​r​t​_​q​4​_​2​0​2​1.pdf
2Badis Ham­mi, Sher­ali Zeadal­ly, and Jamel Neb­hen. 2023. Secu­ri­ty Threats, Coun­ter­mea­sures, and Chal­lenges of Dig­i­tal Sup­ply Chains. ACM Com­put. Surv. 55, 14s, Arti­cle 316 (July 2023), 40 pages. https://​doi​.org/​1​0​.​1​1​4​5​/​3​5​88999
3https://​www​.francetv​in​fo​.fr/​i​n​t​e​r​n​e​t​/​s​e​c​u​r​i​t​e​-​s​u​r​-​i​n​t​e​r​n​e​t​/​c​y​b​e​r​a​t​t​a​q​u​e​s​/​s​o​l​a​r​w​i​n​d​s​-​c​e​-​q​u​e​-​l​-​o​n​-​s​a​i​t​-​s​u​r​-​l​a​-​c​y​b​e​r​a​t​t​a​q​u​e​-​m​a​s​s​i​v​e​-​q​u​i​-​t​o​u​c​h​e​-​n​o​t​a​m​m​e​n​t​-​m​i​c​r​o​s​o​f​t​-​e​t​-​d​e​s​-​a​g​e​n​c​e​s​-​f​e​d​e​r​a​l​e​s​-​a​m​e​r​i​c​a​i​n​e​s​_​4​2​2​3​2​5​3​.html

Our world explained with science. Every week, in your inbox.

Get the newsletter