Common Information
Type | Value |
---|---|
Value |
Supply Chain Compromise - T1195 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Supply chain compromise is the manipulation of products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. (Citation: Avast CCleaner3 2018) (Citation: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) Targeting may be specific to a desired victim set (Citation: Symantec Elderwood Sept 2012) or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. (Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Detection: Use verification of distributed binaries through hash checking or other integrity checking mechanisms. Scan downloads for malicious signatures and attempt to test software and updates prior to deployment while taking note of potential suspicious activity. Perform physical inspection of hardware to look for potential tampering. Platforms: Linux, Windows, macOS Data Sources: Web proxy, File monitoring |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-08-08 | 0 | History and Evolution of Software Supply Chain Attacks | ||
Details | Website | 2023-08-03 | 20 | Ransomware Roundup - DoDo and Proton | FortiGuard Labs | ||
Details | Website | 2023-07-26 | 0 | Supply Chain, Open Source Pose Major Challenge to AI Systems | ||
Details | Website | 2023-07-25 | 4 | North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder | ||
Details | Website | 2023-07-24 | 61 | North Korea Leverages SaaS Provider in a Targeted Supply Chain Attack | Mandiant | ||
Details | Website | 2023-07-21 | 32 | Ransomware Roundup - Cl0p | FortiGuard Labs | ||
Details | Website | 2023-07-20 | 0 | Exploring the macro shifts in enterprise security - Help Net Security | ||
Details | Website | 2023-07-18 | 20 | Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant | ||
Details | Website | 2023-07-17 | 0 | Federal CI/CD security guidance: Been there, done that | ||
Details | Website | 2023-07-14 | 0 | How Hackers Can Hijack a Satellite | ||
Details | Website | 2023-07-13 | 3 | Cyber Security Awareness — Recognizing and Understanding Email Attacks | ||
Details | Website | 2023-07-11 | 1 | Mastodon Patches 4 Bugs, but Is the Twitter Killer Safe to Use? | ||
Details | Website | 2023-07-10 | 98 | Meet LockBit: The Most Prevalent Ransomware in 2022 | FortiGuard Labs | ||
Details | Website | 2023-07-06 | 6 | Ransomware Roundup - Rancoz | FortiGuard Labs | ||
Details | Website | 2023-07-06 | 27 | Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks | ||
Details | Website | 2023-07-05 | 0 | Attacks Against OT & Industrial Organizations Are on the Rise | ||
Details | Website | 2023-06-29 | 0 | NSA and CISA Release Guidelines to Secure CI/CD Environments | ||
Details | Website | 2023-06-27 | 2 | A Double Supply Chain Attack and The Importance of TPRM - Security Boulevard | ||
Details | Website | 2023-06-27 | 5 | Credential Theft Attacks Surge: Microsoft Raises Red Flag on Midnight Blizzard (APT29) | ||
Details | Website | 2023-06-26 | 6 | Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers | ||
Details | Website | 2023-06-26 | 6 | Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers - RedPacket Security | ||
Details | Website | 2023-06-22 | 1 | Millions of GitHub repos likely vulnerable to RepoJacking, researchers say - RedPacket Security | ||
Details | Website | 2023-06-22 | 126 | Ransomware Roundup - Black Basta | FortiGuard Labs | ||
Details | Website | 2023-06-22 | 4 | Insights from CLOP’s MOVEit Extortion Attack | ||
Details | Website | 2023-06-16 | 14 | Ransomware Roundup — Big Head | FortiGuard Labs |