小孩晚上睡觉磨牙是什么原因| 飞刃是什么意思| 千里莺啼什么映什么| 巴卡是什么意思| 喝苹果醋有什么好处和坏处| aqua是什么牌子| 眼镜框什么材质的好| 阴道润滑剂什么牌子好| 一什么而入| 平躺头晕是什么原因| 乙肝病毒表面抗体阳性是什么意思| 满月脸是什么意思| 为什么手臂上有很多很小的点| 栗棕色是什么颜色| 美女的阴暗是什么样的| 儿童嗓子哑了什么原因| 自然人是什么意思| 美国现在什么季节| 牛头不对马嘴是什么意思| kimi什么意思| 郎酒是什么香型| 炉果是什么| 医保卡是什么| 大排畸和四维的区别是什么| 夫妻相是什么意思| 脾虚是什么意思| cho是什么| 右束支传导阻滞是什么病| 做梦被杀了是什么征兆| tc什么意思| 脾切除后有什么影响| 好马不吃回头草什么意思| 马提尼是什么酒| 抗hcv是什么意思| 阳暑吃什么药| 什么什么入胜| 为什么不爱我| 负压是什么意思| 情志是什么意思| 胸小是什么原因| 三千大千世界什么意思| 大姨妈来的少是什么原因| 受精卵着床有什么症状| 女人脾胃虚弱吃什么好| 肾精亏虚吃什么药最好| 备孕为什么要吃叶酸| 血用什么能洗掉| 西瓜可以做什么饮料| 酸辣粉的粉是什么粉| 砂仁是什么| 抗核抗体是什么意思| crp偏高说明什么| 迷妹是什么意思| 男人结扎对身体有什么影响| 孩子发烧是什么原因引起的| 偶数是什么| 胃肠功能紊乱吃什么药| 女人喝黄芪有什么好处| 什么时候立夏| 手背有痣代表什么意思| 朝是什么意思| est.是什么意思| 阿甘正传珍妮得了什么病| 月非念什么| 脑血管堵塞吃什么药最好| 哦多桑是什么意思| 胎儿双侧肾盂无分离是什么意思| 秋天有什么景物| 三七甘一是什么意思| 什么是血糖| 什么食物黄体酮含量高| 什么时候能测出怀孕| 世事无常什么意思| 合作医疗是什么| 绿豆汤放什么糖| 隐性基因是什么意思| 女生学什么专业好| 336是什么意思| 什么是盐| 属猴本命佛是什么佛| 手表五行属什么| 米线是用什么做的| 梦见老公怀孕什么预兆| 脑血栓什么症状| 皮肤变黑是什么原因| 包公是什么生肖| 六月份种什么菜| 什么叫肿瘤| 什么食物对眼睛好| 辟邪剑谱和葵花宝典有什么关系| 孙悟空被压在什么山下| 脆鱼是什么鱼| ggdb是什么牌子| 女生的小鸡鸡长什么样| 什么花好看| 秋天有什么景物| 农历9月17日是什么星座| 冰箱冷藏室结冰是什么原因| 卡码是什么意思| 反流性食管炎b级是什么意思| 沙漠玫瑰什么时候开花| 饭后放屁多是什么原因| 归来是什么意思| 调经止带是什么意思| 蔡明是什么民族| 蛇形分班是什么意思| q12h医学上是什么意思| 蚊子的天敌是什么| 头发厚适合剪什么发型| 凌五行属性是什么| 12min是什么意思| 历久弥新的意思是什么| 排卵期和排卵日有什么区别| 球镜是什么意思| g6pd是什么意思| 阴茎皮开裂是什么原因| 蓝莓对身体有什么好处| 过敏性紫癜是什么病| 什么是速写| 斐然是什么意思| 鞘膜积液是什么病| 气血不足是什么意思| 独宠是什么意思| 迷你巴拉巴拉和巴拉巴拉什么关系| 肺积水有什么症状| 伯恩光学是做什么的| 冠心病吃什么药最有效| 过期的酸奶有什么用途| 甲醛对人体有什么危害| 死了妻子的男人叫什么| 下腹疼是什么原因| 气血不足什么症状| 宫腔内钙化灶是什么意思| 女同性恋叫什么| 失而复得什么意思| 六月二十三是什么日子| 什么是白噪音| 吃什么东西容易消化| bb粥指的是什么意思| 解表药是什么意思| 什么是病原体| 骨癌什么症状| vaude是什么品牌| 钥字五行属什么| 吃维生素c片有什么好处| 理疗是什么意思| 胃炎应该吃什么药| 被交警开罚单不交有什么后果| 梅毒是什么病| 4月26日是什么星座| 吹面不寒杨柳风什么意思| 早入簧门姓氏标什么意思| 烧心吃点什么药| 电风扇什么牌子质量好| 古代地龙是什么| 米糊是什么| 便血鲜红色无疼痛是什么原因| 磕碜是什么意思| 鼓风机是干什么用的| 身体内热是什么原因| 支气管病变什么意思| 艾拉是什么药这么贵| a型rhd阳性是什么意思| 腿无力是什么原因| 八方来财是什么生肖| 大象的耳朵像什么一样| 手足是什么意思| 男人吃洋葱有什么好处| 电轴不偏是什么意思| 为什么智齿到晚上更疼| 十里八乡什么意思| 吃什么不会便秘| 开黄腔什么意思| 三伏天吃什么| 圣旨是什么意思| 羊蛋是什么| 晚上手脚发热是什么原因| 老母鸡炖什么好吃又有营养价值| 肝郁化火是什么意思| 海肠是什么动物| 四大天王是什么生肖| 尿素酶阳性什么意思| 后羿属什么生肖| 鼻涕带血是什么原因引起的| 黄瓜和青瓜有什么区别| 排骨粥要搭配什么好吃| ab型血和b型血生的孩子是什么血型| 是什么符号| 羸弱是什么意思| 芈怎么读什么意思| 脑ct都能查出什么病| 属鸡本命佛是什么佛| 乳腺结节不能吃什么食物| 芹菜和西芹有什么区别| 血糖用什么字母表示| 什么洗面奶最好用| 八方来财是什么生肖| 8.1号是什么星座| 狗舔人是什么意思| 带状疱疹什么引起的| 昆仑山在什么地方| 手癣是什么原因引起的| 敏感肌是什么样的| 孩子肚脐眼下面疼是什么原因| 地动山摇是什么生肖| 吃洋葱有什么好处| 什么人容易高原反应| 核糖体由什么组成| 额头上长小疙瘩是什么原因| 排浊是什么意思| 吃什么对肺有好处| 黄体酮低吃什么补得快| 失眠吃什么药| 吃什么对大脑记忆力好| 肝吸虫病有什么症状| 痛风应该挂什么科| 原发性肝ca什么意思| 呆呆的笑是什么笑| 什么东西燃烧脂肪最快| 佛历是什么意思| 4个月念什么字| 什么叫三观不正| 减肥喝什么茶| 六十而耳顺是什么意思| 早泄要吃什么药| 梦见打篮球是什么意思| 什么是音节什么是音序| 野鸭子吃什么| 为什么夏天吃姜好| 渡劫是什么意思| 苯丙酮尿症是什么| 多梦睡眠质量不好是什么原因| 刻舟求剑的意思是什么| 结局he是什么意思| 连云港有什么好吃的| 相思成疾是什么意思| 2006年是什么命| 槑是什么意思| alan英文名什么意思| 梦见好多死人是什么征兆| 蛋白质是什么意思| 祛风是什么意思| 阴道内壁是什么样的| dq是什么意思| 吃什么润肺| 舌苔厚白应该吃什么| 两融是什么意思| 反酸是什么原因| 八哥吃什么食物| 什么东西补钙最好最快| 梦见笑是什么意思| 更年期失眠吃什么药调理效果好| 产妇吃什么下奶快又多| 老年人手抖是什么原因| 动脉导管未闭是什么意思| 大小脸是什么原因造成的| 生不如死是什么意思| 什么人不宜吃石斛| 起伏不定是什么意思| 知青是什么意思| 科级干部是什么级别| 私奔是什么意思| 细胞器是什么| 毛孔粗大是什么原因引起的| 百度

江字五行属什么

百度 为具有融资业务需求的文化企业提供了未来业务指引及参考依据。

During a supply chain attack, attackers exploit third-party dependencies in order to infiltrate a target’s system or network.

Learning Objectives

After reading this article you will be able to:

  • Define ‘supply chain attack’
  • Explain how a supply chain attack is carried out
  • Learn how to stop supply chain attacks

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is a supply chain attack?

A supply chain attack uses third-party tools or services — collectively referred to as a ‘supply chain’ — to infiltrate a target’s system or network. These attacks are sometimes called “value-chain attacks” or “third-party attacks.”

By nature, supply chain attacks are indirect: they target the third-party dependencies that their ultimate targets rely on (often unknowingly). A dependency is a program or piece of code (often written in JavaScript) from third-party providers that enhances application functionality. A dependency used by an ecommerce retailer, for instance, might help run customer assistance chatbots or capture information about site visitor activity. Hundreds, if not thousands, of these dependencies can be found in a broad range of software, applications, and services that targets use to maintain their applications and networks.

In a supply chain attack, an attacker might target a cybersecurity vendor and add malicious code (or ‘malware’) to their software, which is then sent out in a system update to that vendor’s clients. When the clients download the update, believing it to be from a trusted source, the malware grants attackers access to those clients’ systems and information. (This is essentially how the SolarWinds attack was carried out against 18,000 customers in 2020.)

How is a supply chain attack carried out?

Before a supply chain attack can be carried out, attackers need to gain access to the third-party system, application, or tool they plan to exploit (also known as an “upstream” attack). This may be done by using stolen credentials, targeting vendors with temporary access to an organization’s system, or exploiting an unknown software vulnerability, among other methods.

Once access to this third-party dependency has been secured, the “downstream” attack — the attack that reaches the ultimate target, often via their browser or device — can be carried out in a variety of ways.

Returning to the previous example, the “upstream” attack occurs when the attacker adds malicious code to the software of a cybersecurity vendor. Then, the “downstream” attack is performed when that malware executes on end-user devices via a routine software update.

What are common types of supply chain attacks?

Supply chain attacks may target hardware, software, applications, or devices that are managed by third parties. Some common attack types include the following:

Browser-based attacks run malicious code on end-user browsers. Attackers may target JavaScript libraries or browser extensions that automatically execute code on user devices. Alternatively, they may also steal sensitive user information that is stored in the browser (via cookies, session storage, and so on).

Software attacks disguise malware in software updates. As in the SolarWinds attack, users’ systems may download these updates automatically — inadvertently allowing attackers to infect their devices and carry out further actions.

Open-source attacks exploit vulnerabilities in open-source code. Open-source code packages can help organizations accelerate application and software development, but they may also allow attackers to tamper with known vulnerabilities or conceal malware that is then used to infiltrate the user’s system or device.

JavaScript attacks exploit existing vulnerabilities in JavaScript code or embed malicious scripts in webpages that automatically execute when loaded by a user.

Magecart attacks use malicious JavaScript code to skim credit card information from website checkout forms, which are often managed by third parties. This is also known as “formjacking.”

Watering hole attacks identify websites that are commonly used by a large number of users (e.g. a website builder or government website). Attackers may use a number of tactics to identify security vulnerabilities within the site, then use those vulnerabilities to deliver malware to unsuspecting users.

Cryptojacking allows attackers to steal computational resources needed to mine cryptocurrency. They can do this in several ways: by injecting malicious code or ads into a website, embedding cryptomining scripts into open-source code repositories, or using phishing tactics to deliver malware-infected links to unsuspecting users.

How to defend against supply chain attacks

Any attack that exploits or tampers with third-party software, hardware, or applications is considered a supply chain attack. Organizations typically work with a variety of outside vendors, each of whom may use dozens of dependencies in their tools and services.

For that reason, it may be difficult, if not impossible, for organizations to completely insulate themselves from supply chain attacks. However, there are several strategies organizations can use to preemptively defend against common attack methods:

  • Run a third-party risk assessment: This may include testing third-party software prior to deployment, requiring vendors to adhere to specific security policies, implementing Content Security Policies (CSP) to control which resources a browser can run, or using Subresource Integrity (SRI) to check JavaScript for suspicious content.
  • Implement Zero Trust: Zero Trust ensures that every user — from employees to contractors and vendors — is subject to continuous validation and monitoring inside an organization’s network. Verifying user and device identity and privileges helps ensure that attackers cannot infiltrate an organization simply by stealing legitimate user credentials (or move laterally within the network if they do breach existing security measures).
  • Use malware prevention: Malware prevention tools, like antivirus software, automatically scan devices for malicious code in order to prevent it from executing.
  • Adopt browser isolation: Browser isolation tools isolate (or sandbox) webpage code before it executes on end-user devices, so any malware is detected and mitigated before it reaches its intended target.
  • Detect shadow IT:Shadow IT’ refers to applications and services employees use without the approval of their organization’s IT department. These unsanctioned tools may contain vulnerabilities that cannot be patched by IT, since they are unaware of their use. Using a cloud access security broker (CASB) with shadow IT detection capabilities can help organizations better catalog the tools their employees are using and analyze them for any security vulnerabilities.
  • Enable patching and vulnerability detection: Organizations that use third-party tools have a responsibility to ensure that those tools are free from security vulnerabilities. While identifying and patching every vulnerability may not be possible, organizations should still do their due diligence to find and disclose known vulnerabilities in software, applications, and other third-party resources.
  • Prevent zero-day exploits*: Often, supply chain attacks make use of zero-day exploits that have not been patched yet. While there is no foolproof method for anticipating zero-day threats, browser isolation tools and firewalls can help isolate and block malicious code before it executes.

*Stopping zero-day exploits is still a particularly challenging task for most organizations. In 2021, a zero-day vulnerability was discovered in Log4j, an open-source software library that helps developers log data within Java applications. This allowed attackers to infect and control hundreds of millions of devices, from which they then carried out further attacks, including ransomware attacks and illegal cryptomining. Read more about how Cloudflare defends against the Log4j vulnerability.

How does Cloudflare stop supply chain attacks?

Cloudflare Zero Trust helps thwart supply chain attacks by blocking access to potentially risky websites, preventing malicious uploads and downloads, and auditing the SaaS applications (both approved and unapproved) within your organization.

Cloudflare Zaraz is a third-party tool manager that loads applications in the cloud, so malicious code cannot execute on the end-user browser. Zaraz gives users visibility into and control over the third-party scripts that run on their sites, enabling them to isolate and block risky behavior.

猫咪掉胡子是什么原因 空调什么度数最省电 顾名思义的顾是什么意思 手掌痒是什么原因 pocky是什么意思
淋证是什么病 红枣有什么功效和作用 脸上长痤疮用什么药 头晕目眩吃什么药 痛风能吃什么东西
心结是什么意思 睡觉憋气是什么原因引起的 榴莲有什么品种 什么空如什么 全血铅测定是什么意思
m3是什么意思 eason是什么意思 做梦梦到乌龟是什么预兆 豆是什么结构 肤如凝脂是什么意思
喜用神什么意思hcv8jop8ns9r.cn 子宫直肠陷凹什么意思hcv7jop9ns7r.cn 日照香炉生紫烟是什么意思hcv9jop1ns2r.cn 捻子泡酒有什么功效0297y7.com 牙上有黑渍是什么原因wuhaiwuya.com
什么病不能吃山药hcv9jop3ns8r.cn 什么是桥本氏甲状腺炎hcv8jop1ns4r.cn 心律失常是什么意思hcv8jop8ns7r.cn 蕙字五行属什么hcv8jop6ns5r.cn 无锡有什么好玩的hcv9jop1ns3r.cn
low什么意思hcv7jop5ns3r.cn 黄金发红是什么原因hcv9jop7ns4r.cn 蛋白糖是什么糖hcv9jop5ns4r.cn 狗尾巴草的花语是什么hcv9jop6ns3r.cn 性生活时间短吃什么药hcv7jop6ns8r.cn
有机是什么意思clwhiglsz.com 泡脚对身体有什么好处dajiketang.com 煮牛肉放什么调料weuuu.com 米干是什么hcv9jop7ns5r.cn dan什么意思hcv8jop7ns8r.cn
百度