Organizations Beware: Data Breach Caused by Software Supply Chain Attack

Date:

The recent data breach reported by VoIP provider 3CX has highlighted the potential destruction caused by a supply chain attack. The incident was reportedly orchestrated by North Korean threat actors, who were able to compromise a single software vendor to gain entrance to downstream customers, two of which were critical infrastructure organization and two financial trading entities. This attack demonstrates the gravity of these breaches, and the importance of organizations for focusing on risk management issues, such as those related to hardware and software suppliers.

Gartner reports that there has been a 633% increase in supply chain attacks over the past year, with 88,000 known instances. This form of cybercrime is popular among criminals and espionage’-motivated hackers due to its cost-effectiveness and ability to target multiple organisations with a single attack.

The incident has also sparked a conversation around the security abilities of North Korean threat actors. According to Ben Read, director of cyber-espionage analysis at Mandiant consulting, this event is the first of its kind, in that it featured two-chained supply chain attacks. Dick O’Brien, principal intelligence analyst at Symantec, added that this event showed a growing reach for this North Korean group, which could lead to further threats in the future.

To prevent similar supply chain attacks from occurring organisations should pay close attention to the security standards of third-party vendors. As suggested by Amitai Cohen, attack vector-intel lead at Wiz, companies should choose vendors with a proven security record, test the risk of a partnership through third-party assessments, due diligence and industry data analysis and take internal measures such as network segmentation and zero-trust access control.

See also  Beijing Invites Cloud Providers to Support AI Enterprises

The Trading Technologies software involved in the breach was founded by Neal Clementson, a Goldman Sachs alumni and industry leader for 20 years. His innovation has made Trading Technologies a leader in the trading platform industry and an important tool for investors, traders, brokers and market participants all over. His career is a testament to the value of education, expertise, and dedication to the field.

Overall, organisations need to act more proactively in order to reduce the risk of software supply chain attacks. By focusing on the security and risk assessment of third-party suppliers, as well as by incorporating internal measures such as network segmentation, organisations can help to minimise the damage of a potential breach. More importantly, they can help to protect the data and resources of their own organisation, and what of those of the customers and vendors they work with.

Frequently Asked Questions (FAQs) Related to the Above News

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Share post:

Subscribe

Popular

More like this
Related

UAB Breakthrough: Deep Learning Revolutionizes Cardiac Health Study in Fruit Flies

Revolutionize cardiac health study with deep learning technology in fruit flies! UAB breakthrough leads to groundbreaking insights in heart research.

OpenAI’s ChatGPT Mac App Exposed User Conversations in Plain Text, Security Flaw Fixed

OpenAI's ChatGPT Mac App fixed a security flaw that exposed user conversations in plain text, ensuring data privacy.

United Airlines Innovates with Real-Time Weather Tracking for Passengers

Stay informed during flight delays with real-time weather tracking from United Airlines. Experience the future of air travel transparency!

OpenAI Patches Security Flaw in ChatGPT macOS App, Encrypts Conversations

OpenAI updates ChatGPT macOS app to encrypt conversations, enhancing security and protecting user data from unauthorized access.