Supply Chain Council of European Union | Scceu.org
News

Preventing supply chain attacks – Taipei Times

  • By Chiueh
    Tzi-cker 闕志克

On Dec. 13 last year, cybersecurity company FireEye broke news of the most widespread hacking attack on US government agencies in the country’s history. Government departments affected by the attack, which exploited a vulnerability in proprietary network management software made by the Texas-based software provider SolarWinds, included the US departments of energy, treasury, homeland security, justice and defense.

The SolarWinds incident highlights the severe impact that “software supply chain” attacks can have. Hackers first analyze the software used by the target organization, then identify downstream suppliers to these software products with relatively weak data security practices and infect their software update infrastructure with malicious code. Once the organization updates the software, the malicious code is downloaded onto its systems.

Taiwan is no stranger to software supply chain hacking attacks. From June to November 2018, a software update server operated by Asustek Computer fell victim to a hacker who used a hidden malicious code to infect a new version of software distributed to tens of thousands of Asus laptops, even though the software update carried a valid digital signature.

After receiving information from the Criminal Investigation Bureau, the National Communications Commission on Jan. 6 ordered Taiwan Mobile to recall all 94,000 units of its self-branded, China-made Amazing A32 smartphones after their built-in software was found to contain a malicious program.

An investigation by the bureau found that a malicious program had been embedded into the smartphones’ firmware memory prior to leaving the factory. This means that even if a user restarts or resets their phone, the malicious program would not be removed.

After issuing a recall, Taiwan Mobile carried out an audit of all of its Amazing brand smartphones, and established that only the Amazing A32 is subcontracted to a Chinese manufacturer and the other models do not have the same data security flaw.

Analyses of past instances of software supply chain hacking attacks show that they can basically be classified into four types of attacks.

The first is where the supplier company is itself the attacker.

For example, a bad actor could spend US$100 million to purchase a software company that has tens of thousands of enterprise clients, then use the company’s software product(s) to deliver Trojan horse malicious code. This is a much cheaper and more effective way to infect machines than going to the trouble of developing an online attack that has to infect each target organization one by one.

The second is to hack the software supply company and bury malicious code within its software. This is how the SolarWinds attack was carried out.

The third is when a software supplier uses third-party software in their product that contains malicious code, such as open source software.

The fourth involves a software supplier using third-party software that contains flawed code that can be exploited by hackers. Since contemporary software design makes use of a large number of open source software packages, malicious actors have a relatively large number of opportunities to embed malicious code within frequently used software programs.

The Clean Network program, proposed by the US Department of State in April last year, asks participating telecoms not to use electronic equipment that contains China-made software, such as Huawei Technologies products. This type of policy is designed to pre-empt and prevent the first category of supply chain attack.

In addition to strengthening its own data security protections, Taiwan Semiconductor Manufacturing Co is asking its suppliers to establish basic data security standards, and incorporate these into their routine inspections and audits.

The idea is that if each manufacturer within the industrial ecosystem establishes appropriate data security self-defense, this should help to prevent the second class of supply chain attack.

To resist the third and fourth types of attack requires the manufacturer of each piece of software-containing equipment and device to establish a software bill of materials (SBOM). An SBOM should clearly list all of the open source software packages used within its software, known flaws within each of the packages, the main developer of the software, and the company or organization to which they are affiliated.

Since many of Taiwan’s computer and network communications equipment firms will be expected to provide an SBOM in the future, establishing a database of open source software that conforms to traceability requirements and can continuously track software updates, which can be shared by manufacturers, would greatly reduce the cost of compiling SBOMs for Taiwan’s domestic industries.

Additionally, to more effectively deal with the last two types of supply chain attacks, it would be necessary to develop software analysis tools that can scan the source code of open source software and identify potential malicious software and other vulnerabilities. Unfortunately, such tools are not yet fully mature, and require further research and development.

Chiueh Tzi-cker is general director of Information and Communication Labs at the Industrial Technology Research Institute.

Translated by Edward Jones

Comments will be moderated. Keep comments relevant to the article. Remarks containing abusive and obscene language, personal attacks of any kind or promotion will be removed and the user banned. Final decision will be at the discretion of the Taipei Times.

Related posts

New Data Insight and Analysis Tool, BluIQ by BluJay, Provides Real-time, Actionable Data Views into Supply Chain Applications

scceu

Schneider’s Supply Chain Management Team Delivers Record ROI for Its Customers in 2019

scceu

Third Party Logistics (3PL) Market Extensive Study 2020 by Key Players Analysis- AmeriCold Logistics LLC, DHL Supply Chain, FedEx, Nippon Express Co., Ltd

scceu