Skip to content

Commit 724893a

Browse files
author
Cosimo Commisso
committed
add blog post - supply chain attacks
1 parent e6a68db commit 724893a

3 files changed

Lines changed: 94 additions & 0 deletions

File tree

.gitignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,6 @@ node_modules/
2727

2828
marketing/public/*
2929
marketing/resources/
30+
31+
# vscode
32+
.vscode/*
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
+++
2+
author = "CC"
3+
title = "The Temptation of Software Supply Chain Attacks"
4+
date = "2025-01-12"
5+
description = ""
6+
tags = [
7+
"markdown",
8+
"css",
9+
"html",
10+
]
11+
12+
series = [""]
13+
aliases = [""]
14+
15+
image = "img/thirdparty/supply_chain_attack.webp"
16+
+++
17+
18+
Software supply chain attacks are a growing and highly tempting target for attackers. Unlike traditional attacks, which
19+
typically focus on a specific entity—be it a business, government, individual, or non-profit organization—supply chain
20+
attacks aim at a third-party dependency widely used by multiple entities. This strategy greatly expands the attacker's
21+
reach, potentially affecting thousands of organizations through a single point of compromise.
22+
23+
## The XZ Utils Attack: A Cautionary Tale
24+
25+
A recent and alarming example is the XZ Utils attack from February 2024. XZ Utils, a common package present in most
26+
Linux distributions, became the target of malicious actors. Given that Linux powers approximately 70% of global web
27+
servers, the potential impact of this attack was significant. In this case, attackers added a backdoor to the liblzma
28+
library, a component of XZ Utils, which enabled remote code execution capabilities. Fortunately, the attack was
29+
mitigated early due to the swift discovery by Andres Freund. The compromised versions, 5.6.0 and 5.6.1, had not yet
30+
been widely distributed at the time of detection, preventing a much larger disaster. Nonetheless, this incident
31+
highlights the high stakes involved in securing software dependencies.
32+
33+
## Traditional vs. Supply Chain Attacks
34+
35+
Traditional attacks often involve a precise focus. Whether carried out by an individual hacker or a state-sponsored
36+
group, the goal is to concentrate time and resources on breaching a single target. These attacks can be devastating but
37+
are inherently limited in scope, as they impact only the specific entity being targeted. In addition organizations have
38+
invested heavily in ways to lessen the risk of targeted attacks such as firewalls, intrusion prevention and access
39+
controls.
40+
41+
In contrast, supply chain attacks resemble casting a wide net into the ocean to see what can be caught. By compromising
42+
a software package or dependency used by hundreds or thousands of projects—both commercial and open-source—attackers can
43+
amplify their potential impact exponentially.
44+
45+
## The SolarWinds Attack: A Case Study in Scale
46+
47+
The SolarWinds attack of 2019/2020 remains one of the most infamous examples of a software supply chain attack. In this
48+
case, attackers compromised the build systems responsible for producing the Orion IT management software. By injecting
49+
a backdoor into the Orion updates, they turned a routine software update into a Trojan horse.
50+
51+
Organizations that downloaded and installed the compromised update (all in all it was close to 18,000 customers)
52+
including the U.S. government and numerous Fortune 500 companies—were left vulnerable. The attackers then analyzed
53+
their "catch," identifying high-value targets to exploit further. This strategic use of supply chain attacks
54+
demonstrates the power of targeting dependencies to scale an attack's reach.
55+
56+
## Why Supply Chain Attacks Are So Effective
57+
58+
The examples of XZ Utils and SolarWinds illustrate how supply chain attacks allow attackers to cast a broader net.
59+
While they may not know exactly what they'll catch, the potential rewards often justify the effort. Once a successful
60+
compromise is made, attackers can sift through their victims and prioritize high-value targets.
61+
62+
## Mitigating and Overcoming the Challenges of Supply Chain Attacks
63+
64+
While it is impossible to completely prevent supply chain attacks, organizations can take steps to mitigate the risks
65+
and reduce their impact. One critical strategy is maintaining a clear understanding of what software and dependencies
66+
are in use. This enables swift action when vulnerabilities are disclosed—for example, knowing whether your systems are
67+
running a specific vulnerable version like liblzma v5.6.0 - v5.6.1.
68+
69+
Software Bill of Materials (SBOMs) can play a pivotal role in this process. An SBOM provides a detailed inventory of the
70+
components within a piece of software. As a software producer, generating SBOMs for each build ensures an up-to-date
71+
record of your product's dependencies. As a consumer, requesting SBOMs from suppliers allows you to maintain an
72+
accurate list of the software in use within your organization. This transparency improves your ability to identify and
73+
respond to vulnerabilities effectively.
74+
75+
However, the path to securing the software supply chain is fraught with challenges. Much of the software ecosystem
76+
relies on open-source projects, many of which are maintained by unpaid volunteers. These contributors work on their own
77+
terms, driven by passion rather than profit. As a result, security practices can vary widely, leaving some projects
78+
more vulnerable than others.
79+
80+
Additionally, the sheer scale of dependencies in modern software makes comprehensive auditing a monumental challenge.
81+
Organizations often rely on hundreds, if not thousands, of third-party libraries and tools, creating a sprawling attack
82+
surface that is difficult to secure. Prioritizing security best practices, supporting open-source maintainers, and
83+
fostering collaboration across the software community are essential steps toward mitigating these challenges.
84+
85+
## Conclusion
86+
87+
Supply chain attacks are not just a theoretical risk—they are an ever-present threat in the modern software landscape.
88+
The XZ Utils and SolarWinds incidents serve as stark reminders of the damage that can be wrought when dependencies are
89+
compromised. As attackers continue to refine their techniques, organizations must remain vigilant, prioritize security
90+
best practices, and advocate for greater support and resources for the open-source community to mitigate these risks
91+
effectively.
22.1 KB
Loading

0 commit comments

Comments
 (0)