{"id":53,"date":"2018-10-09T20:36:04","date_gmt":"2018-10-09T20:36:04","guid":{"rendered":"http:\/\/news.nucleon.sh\/?p=53"},"modified":"2019-01-16T10:44:04","modified_gmt":"2019-01-16T10:44:04","slug":"supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/news.nucleon.sh\/ko\/2018\/10\/09\/supply-chain-attacks\/","title":{"rendered":"Supply chain attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">This week <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies\" target=\"_blank\" rel=\"noopener\">Bloomberg<\/a> published a very detailed report about what seems to be one of the biggest, if not the biggest cyber attack identified so far. If you haven&#8217;t heard about it yet, you probably will soon.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-embed-soundcloud wp-block-embed is-type-rich is-provider-soundcloud wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<a href=\"https:\/\/soundcloud.com\/user-705652236\/cybercure-supply-chain-attack\/s-zP5Pw\" rel=\"nofollow\">https:\/\/soundcloud.com\/user-705652236\/cybercure-supply-chain-attack\/s-zP5Pw<\/a>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">In this article we will focus on attacks that are categorised as \u2018supply chain attacks\u2019.<\/span><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"660\" data-attachment-id=\"54\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/2018\/10\/09\/supply-chain-attacks\/board-chips-circuit-343457\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/board-chips-circuit-343457.jpg?fit=3500%2C3500&amp;ssl=1\" data-orig-size=\"3500,3500\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"board-chips-circuit-343457\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/board-chips-circuit-343457.jpg?fit=660%2C660&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/board-chips-circuit-343457.jpg?resize=660%2C660&#038;ssl=1\" alt=\"board-chips-circuit-343457.jpg\" class=\"wp-image-54\" \/><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">A supply chain attack is a cyber attack that seeks to damage an organisation by targeting less-secure elements in the supply network. In one of the previous podcasts we discussed a similar attack, where hackers gained access in the Ukraine to a company that provides accounting software. Users of this software were automatically connected to receive updates. Hackers changed the servers&nbsp;so that users would additionally receive malware, which gave them access to many large Ukrainian companies.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">The Ukraine case is only one incident, but shows the advantages of performing supply chain attacks. If an attacker is able to get himself inside of the production chain of a product, he will gain access to many different networks without much additional effort.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">The story Bloomberg revealed is about two companies located in the USA. The complete story is available in the article with many more details, but we will summarize it for you here.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">The story begins with a company called Supermicro. Supermicro is located in Silicon Valley, California where many well known companies are located.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">The company was founded by a Taiwanese engineer and his wife after they graduated from college in the USA.<\/span><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">Supermicro\u2019s business offering was unique: clients could outsource the technical design of their electrical circuits to engineers in the USA, and then have the production performed in places where labor is cheap like China and by that, reduce the costs of manufacturing electronics.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Today, Supermicro sells more server motherboards than almost anyone else. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">From MRI machines to weapons systems, Supermicro\u2019s motherboards can be found in banks, cloud computing providers, web-hosting services, and many other places. <\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards\u2014its core product\u2014are nearly all manufactured by contractors in China.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">One of the companies that used SuperMicro services is called Elemental Technologies. <\/span><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"313\" data-attachment-id=\"55\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/2018\/10\/09\/supply-chain-attacks\/desert-rescue-xi\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/heron-1-drone-uav.jpg?fit=2740%2C1300&amp;ssl=1\" data-orig-size=\"2740,1300\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;5.6&quot;,&quot;credit&quot;:&quot;SSGT REYNALDO RAMON, USAF&quot;,&quot;camera&quot;:&quot;NIKON D1X&quot;,&quot;caption&quot;:&quot;A Hunter Joint Tactical Unmanned Aerial Vehicle (UAV) in flight during a Combat Search and Rescue (CSAR) training exercise at Fallon Naval Air Station (NAS), Nevada (NV), during exercise DESERT RESCUE XI. The Hunter is an Israeli multi-role short-range UAV system in service with the US Army (USA). The exercise is a joint service Combat Search and Rescue (CSAR) training exercise hosted by the Naval Strike and Warfare Center, designed to simulate downed aircrews, enabling CSAR related missions to experiment with new techniques in realistic scenarios.&quot;,&quot;created_timestamp&quot;:&quot;1060852542&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;92&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0.0003125&quot;,&quot;title&quot;:&quot;DESERT RESCUE XI&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"DESERT RESCUE XI\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;A Hunter Joint Tactical Unmanned Aerial Vehicle (UAV) in flight during a Combat Search and Rescue (CSAR) training exercise at Fallon Naval Air Station (NAS), Nevada (NV), during exercise DESERT RESCUE XI. The Hunter is an Israeli multi-role short-range UAV system in service with the US Army (USA). The exercise is a joint service Combat Search and Rescue (CSAR) training exercise hosted by the Naval Strike and Warfare Center, designed to simulate downed aircrews, enabling CSAR related missions to experiment with new techniques in realistic scenarios.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/heron-1-drone-uav.jpg?fit=660%2C313&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/heron-1-drone-uav.jpg?resize=660%2C313&#038;ssl=1\" alt=\"heron-1-drone-UAV.jpg\" class=\"wp-image-55\" \/><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Elemental made software for compressing massive video files and formatting them for different devices. Its technology helped make it possible to stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency.<\/span><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">To summarize the story so far, a company in the US used the services of a large company called SuperMicro to produce servers which would be installed directly into client networks to improve video delivery.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">In 2015, when Amazon wanted to acquire Elemental Technologies, they tested their servers and made a surprising discovery: a tiny microchip, not much bigger than a grain of rice, that wasn\u2019t part of the boards\u2019 original design.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Amazon immediately reported the discovery to U.S. authorities. Elemental was only one of SuperMicro\u2019s hundreds of customers. Could other customers also be affected? Investigators determined that the chips allowed attackers to create a stealth doorway into any network that included the altered machines. Additionally, investigators were able to discern that the chips were inserted at factories run by manufacturing subcontractors in China.<\/span><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">Chinese spies appeared to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies. Almost 30 companies, including a major bank, government contractors, and other sensitive sites were found to be infected.<\/span><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">Government officials claim that China\u2019s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen. The ramifications of the attack continue to play out. The Trump Administration has made computer and networking hardware\u2014including motherboards\u2014a focus of its latest round of trade sanctions against China, and White House officials have confidently stated that companies will begin shifting their supply chains to other countries as a result.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">The full story contains more details and complications than we cant fit into this article. It can be read at Bloomberg\u2019s website, also it is important to note that all the companies mentioned denied the whole story and published press releases addressing the issue and can be found online.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So what is the truth ??<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Now, Just to balance things out, during March 2017 there was a leak of confidential cyber tools from the CIA. The leak got the code name Vault7; apparently the CIA found a vulnerability &nbsp;to overwrite programs to send data back from computers running specific software, so hundreds of thousands of people from around the world who used innocent programs such Notepad++ suddenly found themselves vulnerable to cyber attacks from the CIA.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\"><br>\n<\/span><span style=\"font-weight:400;\">The main conclusion for this article is that it doesn\u2019t matter in which country you live, be it Russia, China, the USA, or anywhere else, everyone is impacted by sophisticated state-sponsored cyber attacks without even knowing.<\/span><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">(And that everyone are lying.)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><span style=\"font-weight:400;\">Stay safe and see you next time. Don\u2019t forget to visit<\/span><a href=\"http:\/\/www.cybercure.ai\"><span style=\"font-weight:400;\"> www.cybercure.ai<\/span><\/a><span style=\"font-weight:400;\"> for the latest podcasts and cyber intelligence.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article summerize bloomberg story and provides some background on supply chain attacks<\/p>\n","protected":false},"author":143072865,"featured_media":109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1],"tags":[1470,14066,137529853,1142,81678,1371105,47560498,699],"class_list":["post-53","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-china","tag-intelligence","tag-nation-state-attack","tag-podcast","tag-spy","tag-supermicro","tag-supply-chain-attack","tag-usa","entry-image--landscape"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2018\/10\/business-cargo-cargo-container-262353.jpg?fit=5098%2C3399&ssl=1","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paa2yX-R","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/users\/143072865"}],"replies":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":3,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/53\/revisions\/110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media\/109"}],"wp:attachment":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/tags?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}