当前位置:网站首页>New forms of software supply chain attacks
New forms of software supply chain attacks
2022-07-22 04:28:00 【Euler's theorem formula】
Software supply chain attack is a new attack method , It is different from traditional attacks , A software supply chain attack can affect hundreds or even thousands of different goals .
In a nutshell , Suppose I am a cyber criminal , Want to inject malicious code N A different goal . In a traditional cyber attack , I need to figure out about N Three independent vulnerabilities affect each system . Although I can reuse the same attack mechanism for multiple targets , But I can't guarantee that my attack will work in all cases . What's worse is , Here N Any one of the goals may have relatively strict security measures , And it's hard to break . This is the traditional attack method .
Now? , I only need to consider launching a campaign against the same N A systematic supply chain attack is enough , I just need to hack here N A shared dependency in one target can complete the attack on all enterprises in the supply chain . What's more dangerous is , I can try to find the simplest attack surface from countless other sources .
This is why software supply chain attacks are so dangerous : A successful attack can affect a large number of targets .
that , What strategies can the security team adopt to improve the security of the software supply chain ? What tools can provide the most powerful protection ? First , I want to introduce three typical software supply chain attacks .
One 、 Examples of software supply chain attacks
01 Event-stream
Event-stream It's a npm package , Its maintainer is unwilling to carry out subsequent maintenance , So they transferred its publishing permission . The new maintainer added a new one named latMap stream The dependencies of , This dependence is initially benign , And it works .
however , They later updated latMap stream, Make it carry malicious code , Can sniff installed 100 Bitcoin wallets with multiple bitcoins , And send the key to the remote server . If you update your event-stream Or any dependencies , And for latMap stream Defines a version range , Then it will not hesitate to introduce malicious code .
There is only one shared resource (npm The registry ). The target of the attacker is BitPay, But the vulnerability affected other companies , Including Microsoft and most others who don't know event-stream user .
02 SolarWinds Orion
SolarWinds The incident is probably the most famous example of software supply chain attack . The reason why this happens , It's because hackers get security credentials . After all, if your company is SolarWinds,SolarWinds123 Will not be a good password .
Once the attacker destroys these credentials and enters SolarWind The Internet , They started in the whole SolarWind Add malicious code to your system . say concretely , The ultimate goal of hackers is Orion platform , The platform is used for infrastructure monitoring and some security features of large organizations .Orion Considered a single 、 Reliable resources . If the user from SolarWinds download , They hope payload come from SolarWinds.
however , once payload Malicious update , Something like event-stream The attack of .SolarWinds Orion Attacked , Then it affected the Federal Reserve 、 Microsoft 、 Hundreds of organizations including the U.S. Department of energy . This vulnerability has lasted for more than a year , It still plagues many companies and the U.S. government .
03 Codecov Bash
lately , We met Codecov bash uploader problem . because Codecov Of docker An error occurred during image creation , Malicious participants gain access to credentials , Then the attacker can modify Codecov Document and modify it for use in CI Secure the script of the tool in the environment .
For the context ,Codecov Is integrated into CI Code coverage tools in the environment . You download a script and upload your code coverage results to Codecov Server for , also , Attackers can change specific scripts .
Modifying the script allows attackers to extract secret environment variables , If you run the damaged script from the same CI Deploy production services , This situation will become particularly bad . This means that all your production secrets should be considered to have been leaked . What's worse is ,Twilio、GoDaddy And most of the others Codecov Users don't even know about the attack , Know someone checked payload Of hash, Find out that it has something to do with Github Upload script on hash Mismatch .
Two 、 Defend against software supply chain attacks
Now that we have discussed specific cases in supply chain attacks , The next focus is undoubtedly how to defend them . Broadly , We divide these defense mechanisms into two categories : Strategies and tools .
Defense strategies against supply chain attacks
1. Use lockfiles:
In the dependency graph ,lockfiles The version of each package will be fixed in a specific registry . This means that even if a new version is released , And your semantic version range specification allows your code to use it ,lockfiles Will not be changed , Unless you explicitly operate it to complete the update . Besides , majority lockfiles Include hash, You can detect packages payload What happened , To prevent man in the middle attacks .
2. Put dependencies into source control :
Don't install dependencies from the repository every time you install them . You should manage dependencies effectively , For example, sort out a complete SBOM detailed list .
3. Check all codes :
This is obviously a time-consuming and laborious work , But this is very necessary . Some necessary automation tools can significantly improve your detection efficiency .
Defense tools for supply chain attacks
1.SCA: It can identify and provide repair suggestions for known vulnerabilities in open source code . In view of the popularity of open source code in modern software development , This is an important part of the security technology stack . Common ones SCA Tools include Mend SCA、CodeAnt、Checkmarx SCA wait .
2.SLSA frame : This is a Google Released a framework for software component supply chain level , It aims to SDLC Expose metadata in software components at different stages , So as to ensure the integrity of software components in the whole software supply chain .
These strategies and tools have one thing in common : visibility . trace back to event-stream event , The attack was initially discovered because the security tool issued a warning during installation , It is said that there is a network call that is about to be abandoned on a software package that should not be linked to the Internet . This prompted the security team to realize that this could be the source of a malicious attack .
Software supply chain attack is very dangerous , It is also difficult to be detected in time , But use the right SCA Tools 、 Build complete SBOM Lists can be effectively resisted .
边栏推荐
- Techempower web框架性能测试第21轮结果发布--asp.net core继续前进
- Defineexpose, the parent component gets the attribute value in the child component
- 4.基本类型和引用类型?
- tabbar搭建
- DDD - Domain service, Application Service and dto Practice Based on ABP
- 814. 二叉树剪枝 : 简单递归运用题
- 欢迎使用CSDN-markdown编辑器-初次使用编辑模板
- 封装函数baseData.js
- epoch,batch_size
- 自动编码器的相关内容
猜你喜欢
easyui框架dialog重复加载的问题
XXL job (2.3.0) distributed task bean mode, glue shell scheduling practice, source code debug
无锡对全市必胜客门店开展食品安全隐患大排查
欢迎使用CSDN-markdown编辑器模板
基於ABP實現DDD--領域服務、應用服務和DTO實踐
菜鸟同事贵我2k,原是背了涨薪秘籍?(赶紧收藏!)
欢迎使用CSDN-markdown编辑器-初次使用编辑模板
(resolved) for camerads, HR = m_ pGraph-> Connect(m_pCameraOutput, m_pGrabberInput); Solutions to implementation failures
基于ABP实现DDD--领域服务、应用服务和DTO实践
【MFC开发】串口通信示例
随机推荐
9.BOM对象?
Xlnet: operation mechanism and comparison with Bert -- Summary
显示隐藏密码明文+密码框验证信息
Defineexpose, the parent component gets the attribute value in the child component
[Nuxt 3] (七)获取数据
tabbar搭建
Paper reading: a large scale Chinese short text conversation dataset (cdial GPT)
找鞍点
打印机漏洞(rce)
Fake death occurs when Google browser is saved as an image
Import and export of vmvare virtual machine (OVA format)
4.基本类型和引用类型?
Mobile end Foundation
minio文件系统8.0.3
There are always errors in installing plug-ins in NPM
Find saddle point
ionic4学习笔记12-某东项目栅格完成商品列表
编码gbk的不可映射字符
Merge binary tree
机器学习可解释性