Software Supply Chain Cyberattack

By Samiran Ghatak on 01 Mar 2018 @ Nullcon
πŸ“Š Presentation πŸ”— Link
#red-teaming #cyberattack #supply-chain-attack #third-party-risk-management
Focus Areas: βš–οΈ Governance, Risk & Compliance , πŸ“¦ Software Supply Chain Security , 🎯 Penetration Testing , πŸ•΅οΈ Threat Intelligence

Abstract

Few months back, the Windows Defender Advanced Threat Protection (Windows Defender ATP) research team noticed security alerts that captured an interesting attack pattern.

These alerts uncovered a well-planned, finely orchestrated cyberattack that targeted several high-profile technology and financial organizations with possible intentions of a cyberespionage campaign.

An unknown attacker was taking advantage of a silent yet effective attack vector: the compromised update mechanism or software supply chain for a third-party editing tool. We would discuss the scenarios observed and how this vector is quite effective for larger enterprise / business.

I am a Security Analyst with Microsoft in Digital Security and Risk Engineering team with a total work experience of 8+ years dealing with Win Forensics, investigation and Security Ops.