DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Join us tomorrow at 1 PM EST: "3-Step Approach to Comprehensive Runtime Application Security"
Save your seat
  1. DZone
  2. Popular
  3. Open Source
  4. Who Cares if Supermicro Happened — Supply Chain Attacks Are Real

Who Cares if Supermicro Happened — Supply Chain Attacks Are Real

Whether or not the Supermicro hack actually happened, there are serious considerations to be made in regard to supply chain security. Click here to learn more.

Matt Howard user avatar by
Matt Howard
·
Oct. 18, 18 · Analysis
Like (1)
Save
Tweet
Share
3.70K Views

Join the DZone community and get the full member experience.

Join For Free

A shot heard around the world was fired last week when Bloomberg published the article, " The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies." In it, Jordan Robertson and Michael Riley explain how Chinese spies infiltrated nearly 30 U.S. companies by embedding malicious microchips in Supermicro motherboards. The motherboards, which were presumed to be of highest quality, were utilized inside of US data centers, which then provided bad actors with easy access to massive amounts of sensitive information. As the article states, this was "the most significant supply chain attack known to have been carried out against American companies."

To give even more context to the potential scale of this, Robertson and Riley quote a former U.S. intelligence official who said, "think of Supermicro as the Microsoft of the hardware world." He then continued, saying, "attacking Supermicro motherboards is like attacking Windows — it's like attacking the whole world."

As the dust began to settle from the initial shock of what Bloomberg was claiming, most of the companies mentioned in the article vehemently denied these claims. Apple even wrote a letter to Congress, saying the story was "simply wrong." Both the U.K. National Cyber Security Center and U.S. Homeland Security have said they believe Apple and Amazon are telling the truth — and that the alleged Supermicro hack never happened.

While I have no idea if the Bloomberg story is right or wrong — I do know that supply chain attacks are already happening in the world. More than anything, this should be a wake-up call for all of us.

Software Is Even Easier to Pollute Than Hardware

While the Supermicro story pertains to an alleged attack on a hardware supply chain, the scary truth is that it's much easier for bad actors to infiltrate and hack a software supply chain. With hardware, you need to physically access something in order to conduct a hack. With software, you can do it from anywhere.

To this end, I've witnessed 10 events during the past two years that triangulate a serious escalation of software supply chain attacks. Specifically, adversaries have directly injected vulnerabilities into open-source ecosystems and projects. In some cases, these compromised components have been subsequently and unwittingly used by software developers to assemble applications. These compromised applications, which are assumed to be safe, are then made available for use by consumers and businesses alike. The risk is significant, and it's unbeknownst to everyone except the person that intentionally planted the compromised component inside of the software supply chain.

Historically, software hacks have occurred after a new vulnerability has been publicly disclosed, not before. Effectively, "bad guys" have paid close attention to public disclosures, and anytime a new vulnerability has been announced, they move quickly to exploit it before "good guys" can patch it. It's a great business model — especially when you consider that only 38 percent of companies are actively monitoring and managing their software supply chain hygiene.

Today, the game has changed. Organizations now must contend with the fact that hackers are intentionally planting vulnerabilities directly into the supply of open source components. In one such example from February 2018, a core contributor to the conventional-changelog ecosystem (a common JavaScript code package) had his commit credentials compromised. A bad actor, using these credentials, published a malicious version of conventional-changelog (version 1.2.0) to npmjs.com. While the intentionally compromised component was only available in the supply chain for 35 hours, estimates are that it was downloaded and installed more than 28,000 times. Some percentage of these vulnerable components were then assembled into applications that were then released into production. The result is that these organizations then unwittingly released a Monero cryptocurrency miner into the wild, and the perpetrators of the supply chain hack profited handsomely.

So, here's the point: whether the Bloomberg report on Supermicro is real or not, the truth is that attacks are already happening in our technology supply chains — both software and hardware. Furthermore, it's much easier for bad actors to pollute the global supply of open-source software components than it is for them to implant chips on computer motherboards. Now more than ever, it's time to talk about ways to secure our supply chains.

Open source Software

Published at DZone with permission of Matt Howard, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Top Five Tools for AI-based Test Automation
  • How Do the Docker Client and Docker Servers Work?
  • Why Does DevOps Recommend Shift-Left Testing Principles?
  • Visual Network Mapping Your K8s Clusters To Assess Performance

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: