Case Study

THE SUPPLY CHAIN ATTACKS

THE SUPPLY CHAIN ATTACKS

Pages 8 Pages

WEAKEST LINK: THE SUPPLY CHAIN BACKDOOR FOR AD ATTACKSWEAKEST LINK: THE SUPPLY CHAIN BACKDOOR FOR AD ATTACKS 2 Cyberthreats stemming from the subcontracting chain represent a new major risk to businesses and government agencies. Looking at the attack models used in 2018 and 2019, cyberattacks exploiting the subcontracting chain doubled in 2019 over the previous year. This is a major development in the operational models of hacker groups: instead of going directly at the target, threat agents operate by first infecting a direct or indirect supplier of the intended victim. What categories of attacks threaten the subcontracting chain? We can divide attacks that exploit the subcontracting chain into three major categories: 1. A traditional programmed attack using the subcontractor as

Join for free to read