The SolarWinds hack showed how under-protected many vendors are and how easy it is for companies to be attacked through their vulnerable suppliers. In today’s post, we’ll look at the risks companies are exposed to through their vendors and share some ideas on how organizations can plug the gaps and increase their security.
Related on MHA Consulting: Distracted by COVID: Don’t Forget to Keep Tabs on Your Long-Term Risks
In the recent hack of IT powerhouse SolarWinds, hackers thought to be Russian broke into the company’s Orion software system, which is used by the majority of Fortune 500 companies, many top government agencies, and thousands of other clients. The hackers inserted malicious code which SolarWinds unwittingly sent out to 18,000 of its clients when making routine software updates.
The SolarWinds hack was bad enough, but it probably amounts to only an opening salvo in this new type of cyber-struggle.
The significance of the SolarWinds hack for business continuity professionals is it’s not just a one-off attack. Rather, the hack highlights a pervasive and rising vulnerability that BC pros need to be cognizant of and take steps to correct.
What is the danger, exactly? It’s that hackers might penetrate one of your suppliers and then, once they’re inside, gain the means to infiltrate your organization through the back door. They can then spy on its activities, cripple its operations, and steal its data.
The irony is, tools such as automatic updating that make it easy to keep software current also make it easy for thieves to fan out through the vendor’s clients’ networks and wreak havoc.
It hurts to say it, but these hackers are extremely intelligent. Corporate IT people might be the cream of the crop. Hackers on the level of the SolarWinds attackers are the cream of the cream, at least in terms of technical ability. (In other areas, it’s another story.)
The people who broke into SolarWinds didn’t hit on such a strategically rich target by accident. They know what kinds of vendors are likely to provide deep access to rich targets. Few third-party service providers are shy about listing their most important clients on their websites. This means hackers can scan the providers’ sites like people at a restaurant looking at the menu and thinking about what dishes they might like to order. (“If we break into Orion, we can gain access to Microsoft, Boeing, the Department of Homeland Security, and the Los Alamos National Laboratory!”)
With SolarWinds, the attack was purely digital. But it’s not hard to imagine an attack that’s part digital and part physical. It might be worth the effort for a high-value target. Suppose an attacker breached one of the target’s vendors and gained critical information about the target, such as the name of the technician assigned to that account. The attacker might then be able to forge credentials, impersonate a substitute technician, gain access to the data center, and replace a clean drive with one containing a virus.
Today this idea seems outlandish; tomorrow you could read about it in the newspaper.
That’s a sketch of the risks companies face through third-party attacks. Let’s turn to how they can make themselves safer.
For the most part, protecting your company against back-door attacks through your suppliers is not about putting new infrastructure and processes in place. It’s about risk assessment, supplier analysis, and ensuring that the appropriate checks and balances are in place for your environment.
First, you should understand who your technology vendors are, how they are protecting their IT and your data, and how it would impact you if they suffered a breach.
The SolarWinds attack highlighted a key vulnerability of many companies: if a hacker breaches one of your suppliers, he or she might gain the ability to sneak into your network through the back door, infecting your system, spying on your activities, and stealing your information. This is a serious and overlooked problem and one that is likely to increase in the coming years. However, by scrutinizing your supply chain and making the recommended adjustments, you can reduce your organization’s exposure to this kind of attack.
For more information on vendor security, vulnerable vendors, and other hot topics in BC and IT/disaster recovery, check out these recent posts from MHA Consulting and BCMMETRICS: