April 23, 2018//Ellen NeveuxLast Updated: June 22, 2021
With the attack on the City of Atlanta, hackers targeting critical infrastructure shouldn’t come as a shock. Long gone are the days of hackers only targeting credit card information; they are looking to disrupt the things we take for granted—and right now hackers are feeding off third-party access to critical infrastructure. This is because hacking into a system offers a lot of options, like access to sensitive information or even shutting down whole systems. Supply chain attacks are becoming more popular, which leads us to this question: how do we protect our infrastructure from a supply chain attack?
Understanding supply chain attacks
When infrastructure is attacked, it is known as a supply chain attack. It is known as such since a supply chain is defined as the network between an organization and its vendors that work together to supply a product or service. According to CSO Online, an attack on a supply chain happens when a bad actor infiltrates a system through an outside vendor or provider that has access to systems and networks. In other words, a bad actor gains access to a third-party vendor’s access point and then has the ability to get in and wreak havoc on critical infrastructure. Things like 911 call centers, servers, payment systems, and more have been shut down resulting from a supply chain attack.
One noteworthy example of a supply chain attack has been Russia’s involvement in critical infrastructure in the United States. Russia has attacked, or attempted to attack, critical infrastructure like U.S. power grids, nuclear power plants, and the 2016 election. According to Forbes, Russia has attacked and infiltrated nearly everything that we, as a country, rely on to function.
Infrastructure is being targeted
Critical infrastructure is being targeted by bad actors, and because no one can afford for systems to be down, attacks are stressful and can even be deadly. A popular form of supply chain attacks is on 911 call centers. Imagine having an emergency and needing to call 911 for help; you would expect someone to answer and for help to be on its way shortly after. Now imagine that the 911 call center closest to you has been hacked, your phone call is put on hold, and you can’t get help for your emergency. This is a reality when 911 call centers are attacked.
For many, this is just a horrific and hypothetical situation, but this nightmare wasn’t a hypothetical for one family in Texas. In 2017, an emergency that was put on hold resulted in the death of a six-month-old. Hackers are infiltrating critical infrastructure, like 911 call centers, which disrupts and shuts down the things that we need and rely on the most.
No end in sight for supply chain attacks
According to SecuLore Solutions, 184 cyberattacks on public safety agencies and local governments have occurred over the past 2 years. Of those, 42 (22.8 percent) of attacks directly or indirectly affected 911 call centers. It’s obvious that supply chain attacks will continue to be relevant, especially with the recent attack on Baltimore’s 911 call center.
The attack on Baltimore began as ransomware that shut down the center. While systems were down, Baltimore was forced to revert back to manual mode for each call. According to NBC News, Baltimore City Information Technology determined that this attack occurred because the hacker found a way into the system via an opening in the system. Their access point stemmed from a technician who was troubleshooting the computer-aided dispatch (CAD) system. After making the change to the system, the technician mistakenly left open a port. That opening worked as an access point for a bad actor to get in, which led to Baltimore’s 911 call center to rely on manual mode for 17 hours.
How supply chain attacks happen
Supply chain attacks come in many forms. But according to Motherboard, some of the most common ways that supply chain attacks happen are as follows:
Remember, these are just a few examples for bad actors to get in. Unfortunately, hackers are able to adapt and get in many different ways. Hackers will always use a path of least resistance, so don’t allow your network to have one and protect your network with the right secure remote access platform and software.
How to protect yourself
Since supply chain attacks are nearly impossible to detect, the best offense is a good defense. One of the best ways to do that is to check the vendors you are currently working with or are planning to work with. What does their security track record look like? Inquire about both audits and internal security practices and take control of your network.
According to Bogdan Botezatu, a senior analyst at an antivirus vendor organization, vendors need to have strong internal auditing and code review practices in place in order to ensure that the products they release perform as originally intended. In other words, use a platform that ensures compliance between organizations and vendors. It could be what saves you from a supply chain attack.
Our sole focus is secure third-party remote access. For highly regulated enterprise organizations, SecureLink Enterprise has pioneered a secure remote access platform. SecureLink for enterprise allows an organization to identify, control, and audit third-party vendors. For vendors, SecureLink is the gold standard remote access support platform because it is easy, efficient, and ensures compliance and reduces liability when supporting customers.