How does Cyber-attacks target supply chains

Blog 0 comments

Cyber security is not to be taken lightly, especially in the wake of recent attacks by hackers on infrastructure of government and private organizations around the world. It is of utmost importance that organizations safeguard their data and client information under more secure and resilient infrastructure, according to the Cybersecurity and Infrastructure Agency. The agency has been closely monitoring the attacks by hackers where supply chains were the target (Cyber-attacks target supply chains).


Vulnerabilities in open-source networking libraries affect millions of mobile devices


Cyber-attacks target supply chains

How do hackers infiltrate Supply chains?

Hackers target smaller companies in the Supply Chains as their infrastructure is weak and not up to security standards. When the hacker can infiltrate the Supply Chain infrastructure, it can easily access and steal information of larger companies or even attack the end users or consumers or citizens like you and me. Supply Chains are a virtual tunnel where exchange of information, products, services, finances etc. take place between large number of partners and if even one of these partners is compromised, then the entire supply chain is in danger, and eventually an entire industry or an economy could be targeted.

According to an article published in CSOonline, Edna Conway, the Chief Security Officer at Cisco Systems, said, that the company is worried about manipulation, espionage that could breach at the state, national and industrial level. It is important to keep the trust element. According to Jim Routh, CSO of Aetna, companies need to approach third-party cyber attacks as a business risk and need to be managed and monitored continuously (Cyber-attacks target supply chains).

Embedded vulnerabilities found in Open-Source networking stacks

How to protect Supply chains?

According to CISA, companies must prioritize in upping the security of their infrastructure. This can be done in the following ways:


  1. Conduct Risk and threat assessment of the organization and third-party.

  2. Conduct Supply-chain vulnerability assessment and make sure anti-forensic investigation is not possible by criminals.

  3. Devise tailor-made procedures to counter these threats immediately, especially by scrutinizing and reviewing third party risk.

  4. Engage suppliers and put in place real-time surveillance and monitoring.

  5. Plug any leaks or errors in the infrastructure that could be potential for breaches in the future.

  6. Create a route map of ICT (Information and Communications Technology) security threats on supply chains and understand it fully, and uncover hidden loopholes.

  7. Perform agreement assessment, conduct audits and penetration tests of all the vendors in your organisation.

  8. Put in place the best hardware and software anti-virus to evade malware etc.

  9. Create transparency by implementing block chain and hyper ledger techniques to protect end-to-end supply chain.

  10. Secure Communications Networking can be put in place like SSL (Secure Sockets Layer), VPN (Virtual Private Network), provide security for the IPv4 version.

Cyber-attacks have become more sophisticated and the most common type of cyber-attacks target IPs of an organization:


  1. DoS (Denial of Service) and DDoS Attack

  2. Teardrop Attack

  3. Smurf Attack

  4. Ping of Death (PoD) Attack

  5. Botnets

Impact Of Covid 19 On DDI Industry in 2020


Author ipvadblog

Leave a Reply

Your email address will not be published. Required fields are marked *