Russian hack of US agencies exposed supply chain weaknesses

The elite Russian hackers who gained access to computer systems of federal agencies last year didn’t bother trying to break one by one into the networks of each department. Instead, they got inside by sneaking malicious code into a software update pushed out to thousands of government agencies and private companies. It wasn’t surprising that hackers were able to exploit vulnerabilities in what’s known as the supply chain to launch a massive intelligence gathering operation. The US officials and cybersecurity experts have sounded the alarm for years about a problem that has caused havoc, including billions of dollars in financial losses, but has defied easy solutions from the government and private sector. “We’re going to have to wrap our arms around the supply-chain threat and find the solution, not only for us here in America as the leading economy in the world but for the planet,” William Evanina, who resigned last week as the US government’s chief counterintelligence official, said in an interview. “We’re going to have to find a way to make sure that, we, in the future, can have a zero-risk posture and trust our suppliers,” he added. In general terms, a supply chain refers to the network of people and companies involved in the development of a particular product, not dissimilar to a home construction project that relies on a contractor and a web of subcontractors. The sheer number of steps in that process, from design to manufacture to distribution, and the different entities involved give a hacker looking to infiltrate businesses, agencies and infrastructure numerous points of entry. This can mean no single company or executive bears sole responsibility for protecting an entire industry supply chain. And even if most vendors in the chain are secure, a single point of vulnerability can be all that foreign government hackers need. In practical terms, homeowners who construct a fortress-like mansion can nonetheless find themselves victimised by an alarm system that was compromised before it was installed.

Be the first to comment

Leave a Reply

Your email address will not be published.