SolarWinds and Qualys Attacks: Why You Need Supply Chain Threat Detection - ThreatWarrior

SolarWinds and Qualys Attacks: Why You Need Supply Chain Threat Detection

by | Mar 4, 2021

The SolarWinds attack was a pivotal moment for cybersecurity, proving that sophisticated threat actors could breach an organization through their trusted security supply chain. The recent Qualys attack — in which cybersecurity firm Qualys suffered a data breach due to a zero-day vulnerability in a third-party tool — serves as another reminder that the idea that “trusted = safe” is a fallacy.

In fact, it is not just the security supply chain at risk, but any software that attackers can use to breach your organization, especially software applications that both contains sensitive data and automatically updates.

Traditionally, the supply chain refers to every component involved in delivering a product, from production to distribution, and everything along the way that affects the end consumer from receiving it.

However, the world runs on software now. From the computers we use at work to our mobile devices, connected homes, and IoT — we’re powered by code. The software supply chain is anything that touches that code from development to production and updates and enhancements. It includes version releases, known vulnerabilities, and security controls. It even has other software running on the same infrastructure the applications are running on.

This means that software supply chain risks are inherited from an organization’s dependencies, which are pervasive. Adversaries can inject malicious code through auto-updates, poison a network with clandestine malware through a backdoor, or use any number of ways to breach an organization. If the infrastructure used to deliver the software or the software itself is breached, the damage is done. An organization has to deflect every attack; a bad actor only needs to succeed once.

Organizations today rely on hundreds if not thousands of software suppliers, and users are continually consuming and updating that software. Software supply chain security includes protecting all of that third-party software and externally sourced applications. This starts with gaining control and visibility over your entire organization.

How ThreatWarrior Protects the Software Supply Chain

ThreatWarrior was natively built to help you better protect your supply chain. Our Supply Chain Threat Detection capabilities identify known threat signatures and anomalies in your software supply chain, including in your other critical software applications and security tools.

The growing supply chain introduces new vulnerabilities to your organization, and auto-updates can further increase the threat surface. ThreatWarrior reveals any anomalous behavior or suspicious updates, and identifies malicious communication between your environment and outside entities.

Additionally, ThreatWarrior protects your network while remaining invisible to threat actors. As demonstrated in the SolarWinds attack, sophisticated threat actors can design their malware to lie dormant on a victim’s network to avoid being observed by security analysis tools, with the goal of activating later to evade detection. Every security tool visible on the network is not only ineffective, it’s a target.

Many cybersecurity strategies and practices were created in a time when organizations still believed they could trust their vendors and third-party applications. Today, we know that “only using trusted vendors” does not make your network secure. Trusted vendors, even cybersecurity vendors, can be used to leverage attacks against an organization. Just because a solution is already deployed inside an enterprise does not make it immune to compromise.

SolarWinds and Qualys are not the only cyberattacks to leverage the software supply chain, and we’ll certainly see more of this type of attack. The hyper-connected supply chain requires more attention than ever to secure and security models must adapt to reflect that. It’s time for organizations to rethink their security strategies.

Contact us today to learn more about supply chain threat detection and see how ThreatWarrior protects your network and software supply chain from constantly-evolving cyber threats.

Related Insights

National Supply Chain Integrity Month

National Supply Chain Integrity Month

The Cybersecurity and Infrastructure Security Agency (CISA) is partnering with the Office of the Director of National Intelligence (ODNI), the Department of Defense, and other partners to recognize April as National Supply Chain Integrity Month and promote a call to...

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of the iceberg....

Breach Blog: The Texas Ransomware Attack

Breach Blog: The Texas Ransomware Attack

Prep your systems, local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at this time how the attack...