Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Application Security Risk in 2019: It's All About Supply Chain

DZone 's Guide to

Application Security Risk in 2019: It's All About Supply Chain

Cybercriminals are intentionally planting vulnerabilities directly into the global supply of open-source components.

· Security Zone ·
Free Resource

It's that time of year again; it's time to reminisce over the past year and prepare our organizations to tackle the opportunities and challenges that lie ahead in 2019.

While the rapidly changing landscape of cyber risk management makes it impossible to predict with certainty where tomorrow's danger lies, we can — and should — examine the empirical facts staring us in the face and do our best to make an educated guess about how to defend against future risks.

2018 had a number of events we should take into consideration when evaluating potential risk - but, we don't need to look too far back to find what I believe will be the most important issue of 2019. In the last 90 days, the world witnessed three different cyber events highlighting how vulnerable the technology supply chain truly is. This pattern suggests that organizations everywhere must resolve themselves to creating controls designed to protect their technology supply chains from attack in 2019.

The culprits? Supermicro, Event-Stream, and Cloudhopper. Three separate attacks. All of them different. All of them terrifying. And, all of them aimed at exploiting weaknesses within the global technology supply chain.

The Proof is in the Hack: Poisoned Rivers Flow Downstream

In early October, Bloomberg published its now famous article "The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies." In it, reporters Jordan Robertson and Michael Riley alleged that Chinese spies purposely polluted Supermicro's hardware supply chain and subsequently hacked more than 30 downstream companies including Apple and Amazon. (NOTE: Supermicro vehemently denies the allegations, but Bloomberg stands by the story).

Just a month ago, the world became aware of event-stream, a surprisingly simple software hack in which a cunning perpetrator hijacked ownership of the popular event-stream open source project, implanted crypto-mining malware in the JavaScript component, waited for the polluted component to surface downstream in the production CoPay wallet, and then stole god only knows how much cryptocurrency.

Then, last week, cloudhopper entered the spotlight. What is cloudhopper? You guessed it. It's the latest cyberattack to leverage weaknesses in the technology supply chain so that perpetrators can exploit downstream victims at scale. This time, however, the bad actors didn't target the "hardware" supply chain. The didn't even target the "software" supply chain. Instead, they targeted the "service" supply chain. Specifically, they intentionally hacked HPE and IBM — not for purposes of harming either of them — but for purposes of exploiting their thousands of managed service clients downstream.

Where Do We Go From Here?

Hackers are lazy, but they aren't stupid, and they definitely understand scale. Given the opportunity, they will always jump at the chance to target any vulnerable part of the modern technology supply chain. Bad actors know that by gaining access to the supply chain, they can kill many, many birds with just one stone.

Heading into 2019, the world should fully expect that cybercriminals will continue to look for weaknesses in any and every part of the technology supply chain — hardware, service, and software. But, with our eyes wide open, we should recognize the scary truth: the easiest point of entry into the technology supply chain is software channels — and, in particular, open-source ecosystems. Hackers already understand this.

Want Some Proof?

In addition to the event-stream hack on the JavaScript that supply chain disclosed last month, there were numerous similar software supply chain attacks in the past year, including VestaCP and Colorama.  Furthermore, in 2017, the world watched NotPetya wreak havoc, a classic example of a software supply chain attack.  Also, in 2017, nearly 2.5 million people were forced to deal with CCleaner, also seeded in the software supply chain.

Indeed, over the past two years, the research team at Sonatype has identified 10 separate events pointing to a serious escalation of supply chain attacks aimed at open-source ecosystems. Adversaries injecting vulnerabilities directly into projects and intentionally poisoning the well that millions of developers drink from. In many cases, these compromised components were unwittingly used by software developers to assemble applications. Then, these compromised applications were made available for use by consumers and businesses alike. The risk is significant — and, worse yet, it's unbeknownst to everyone except the person that intentionally planted the compromised component inside of the open source software supply chain.

We're Not in Kansas Anymore.

In the past, open-source software hacks like Heartbleed, Bouncy Castle, and Equifax occurred after a new vulnerability has been discovered and publicly disclosed. Effectively, "bad guys" would wait for new vulnerabilities to be announced — and would then move quickly to exploit it in the wild before "good guys" could get around to patching it.

Today, the game is getting much, much faster. It's like going from high school football straight to the NFL and skipping college altogether.

Organizations can no longer afford to ignore the reality that hackers are intentionally planting vulnerabilities directly into the global supply of open source components. As companies head into 2019, they would be wise to learn how to run fast enough to harness all of the good offered by open source software supply chains — but without any of the risk.

Topics:
security ,2019 predictions ,2019 ,supply chain ,app security ,risks ,application security

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}