Page 237 - Cyber Defense eMagazine June 2024
P. 237
reveals a concerning trend where supply chain interactions, primarily through third-party software, have
become significant breach points. The infamous instances of software like SolarWinds and the less-
discussed but equally threatening 3CX, where malicious updates led to widespread security breaches,
serve as stark reminders of this vulnerability.
Vulnerabilities in Third-Party Integrations:
As businesses integrate more third-party solutions into their operations, the attack surface widens. The
report shows how attackers are increasingly targeting less-secure elements within the supply chain to
deploy ransomware or conduct extortion operations. High-profile breaches involving software like
SolarWinds and 3CX exemplify how quickly and extensively damage can spread through these
vulnerabilities.
Vulnerabilities Introduced in Open Source Dependencies:
The recent CVE-2024-3094 vulnerability in XZ Utils involved a backdoor that enabled unauthorized
remote code execution (RCE) and could bypass SSH authentication. This critical flaw was surreptitiously
introduced by a trusted maintainer over a two-year period. If not identified and mitigated in a timely
manner, this vulnerability could have allowed attackers to gain full control of affected systems, potentially
leading to widespread unauthorized access, data breaches, and disruption in services across numerous
Linux distributions where XZ Utils is deployed.
The Role of Third-Party Software:
The DBIR indicates that 15% of breaches involved third-party software vulnerabilities, a notable increase
from previous years. This trend shows a growing reliance on external vendors and the inherent risks
associated with it. Ransomware and extortion attacks often exploit these vulnerabilities, compromising
not just a single entity but entire networks connected through supply chains.
Strategies Used by Industry to Combat Risks Introduced by Open Source:
A Software Bill of Materials (SBOM) is increasingly requested by organizations seeking to evaluate third-
party solutions before procurement. This growing trend reflects a heightened awareness of cybersecurity
risks associated with software supply chains. An SBOM provides a detailed inventory of all components,
libraries, and modules contained in a software product, along with their versions and dependencies. This
transparency enables organizations to identify potential security vulnerabilities, compliance issues, and
operational risks inherent in third-party software.
Cyber Defense eMagazine – June 2024 Edition 237
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.