{"id":13550,"date":"2018-10-10T09:10:02","date_gmt":"2018-10-10T17:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/10\/news-7317\/"},"modified":"2018-10-10T09:10:02","modified_gmt":"2018-10-10T17:10:02","slug":"news-7317","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/10\/news-7317\/","title":{"rendered":"Bloomberg blunder highlights supply chain risks"},"content":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000<\/strong><\/p>\n<p>Ooh boy! Talk about a back-and-forth, <em>he said, she said<\/em>\u00a0story!<\/p>\n<p>No, we\u2019re not talking about that Supreme Court nomination. Rather, we\u2019re talking about <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-09\/new-evidence-of-hacked-supermicro-hardware-found-in-u-s-telecom\" target=\"_blank\" rel=\"noopener\">Supermicro<\/a>. Supermicro manufacturers the type of computer hardware that is used by technology behemoths like Amazon and Apple, as well as government operations such as the Department of Defense and CIA facilities. And it was recently reported by Bloomberg that Chinese spies were able to infiltrate nearly 30 US companies by compromising Supermicro\u2014and therefore our country&#8217;s technology supply chain.<\/p>\n<p>If you\u2019ve been trying to follow the story, it may feel a bit like this:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25812\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/attachment\/kittens\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/kittens.gif\" data-orig-size=\"400,218\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"kittens\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/kittens-300x164.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/kittens.gif\" class=\"aligncenter size-full wp-image-25812\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/kittens.gif\" alt=\"\" width=\"400\" height=\"218\" \/><\/p>\n<h3>What do we know so far<\/h3>\n<p>On October 4, <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies\">Bloomberg Businessweek<\/a> detailed a narrative regarding Chinese government influence into the operations of US-based hardware manufacturer Super Micro Computer, Inc., or simply Supermicro. The article was produced using information from 17 different anonymous sources including \u201cone from a Chinese foreign ministry,\u201d and draws on research spanning more than three years of investigations.<\/p>\n<p>The article alleges that operatives from a unit of the People\u2019s Liberation Army used a method known as seeding to compromise the Supermicro supply chain. They did this by coercing Chinese-based subcontractors responsible for the creation of the hardware circuitry to secretly install a high-tech spying chip into the motherboards and systems of computers destined for high-profile customers.<\/p>\n<p>Bloomberg suggests the access by top-level operatives allowed the Chinese government to conduct a highly-targeted and highly-complex spying operation against worldwide organizations and in all sectors of business, including finance, health, government, and private.<\/p>\n<div id=\"attachment_25804\" style=\"width: 579px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25804\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/attachment\/supermicro-compromisedchip\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip.png\" data-orig-size=\"569,499\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SuperMicro &#8211; CompromisedChip\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip-300x263.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip.png\" class=\"wp-image-25804 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip.png\" alt=\"\" width=\"569\" height=\"499\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip.png 569w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-CompromisedChip-300x263.png 300w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">That little chip is what the Bloomberg article says is responsible.<\/p>\n<\/div>\n<p>According to the article, the problem stems from a tiny microchip, not any bigger than a pencil tip, and that had been embedded to the electronic circuitry of compromised devices. Though the intent of the microchip remains uncertain, the article suggests it was capable of communicating with anonymous computers on the Internet and loading new code to the device operating system.<\/p>\n<p>In at least one case, the malicious microchips are alleged to be thin enough as to be embedded in between the layers of fiberglass onto which the other components were attached.<\/p>\n<div id=\"attachment_25803\" style=\"width: 483px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25803\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/attachment\/supermicro-hardware-layers\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers.png\" data-orig-size=\"473,482\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SuperMicro &#8211; Hardware layers\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers-294x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers.png\" class=\"wp-image-25803 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers.png\" alt=\"\" width=\"473\" height=\"482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers.png 473w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-Hardware-layers-294x300.png 294w\" sizes=\"auto, (max-width: 473px) 100vw, 473px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">The malicious microchip can be embedded between layers of hardware fiberglass.<\/p>\n<\/div>\n<p>The chips have the ability of being able to modify the instructions between the operating system and CPU, and can allow for code injection or other data-alteration techniques. The code has also created a stealth doorway into the networks of altered machines.<\/p>\n<p>Or as Bloomberg put it:<\/p>\n<blockquote>\n<p>The implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard. This happened at a crucial moment, as small bits of the operating system were being stored in the board\u2019s temporary memory en route to the server\u2019s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.<\/p>\n<\/blockquote>\n<p>Talk about some deep-state, James Bond\u2013level stuff.<\/p>\n<p>Here, we have a story detailing illicit government operations and covert operatives who have systematically compromised the supply chain of one of the world\u2019s largest motherboard and custom hardware manufacturers. Threat actors have accomplished this using a deeply-technical and highly-targeted\u2014not to mention a nearly impossible mechanism to detect\u2014hardware attack utilizing incredibly small, sophisticated microchips that are embedded between the individual hardware fiberglass layers.<\/p>\n<p>And why did they do it? To initiate clandestine spying operations against some of the worlds\u2019 largest entities in order to exfiltrate sensitive intellectual property and top-secret government information.<\/p>\n<p>Quick, call a Hollywood director. I have a story to pitch!<\/p>\n<p>This is indeed a fantastic story filled with all sorts of nail-biting suspense and adventure, but just like any good Hollywood caper, we have to ask ourselves: Is there any truth to it? We imagine that when storytellers got a whiff of this tale, they did something like this:<\/p>\n<p><iframe  src='https:\/\/www.youtube.com\/embed\/lAkuJXGldrM?version=3&#038;rel=1&#038;fs=1&#038;autohide=2&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<h3>Did that really happen?<\/h3>\n<p>One problem with verifying this story is that this type of attack isn\u2019t detectable by any security solution. Right now, no one can detect hardware-level modifications using custom hardware solutions that have been systematically installed at the manufacturer level. That kind of detection protocol just doesn\u2019t exist yet.<\/p>\n<p>Another problem: Aside from the S.O.C.-generated network logs pointing fingers at compromised machines and vulnerable networks\u2014for which the article said there were none\u2014no one can prove or disprove this story.<\/p>\n<p>Few security researchers are going to have access to the $100,000+ computers where these chips are said to reside. And even fewer of those researchers work for organizations that will let them start analyzing and ripping capacitor-looking circuits from the board. So basically, we\u2019re left having to trust the anonymous sources used for the report.<\/p>\n<p>This state of unknown even led well-known Google security researcher Tavis Ormandy to <a href=\"https:\/\/twitter.com\/taviso\/status\/1048786288441098241\" target=\"_blank\" rel=\"noopener\">liken<\/a> the event to the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Chemtrail_conspiracy_theory\" target=\"_blank\" rel=\"noopener\">chemtrails conspiracy theory<\/a> and the hunt for Sasquatch.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25802\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/attachment\/supermicro-travisormandy\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy.png\" data-orig-size=\"667,322\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SuperMicro &#8211; TravisOrmandy\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy-300x145.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy-600x290.png\" class=\"aligncenter size-full wp-image-25802\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy.png\" alt=\"\" width=\"667\" height=\"322\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy.png 667w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy-300x145.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/SuperMicro-TravisOrmandy-600x290.png 600w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/a><\/p>\n<p>In the days since Bloomberg\u2019s publication of the story, there have been <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-04\/the-big-hack-amazon-apple-supermicro-and-beijing-respond\" target=\"_blank\" rel=\"noopener\">significant rebukes and outright denials<\/a>\u00a0from the companies and government agencies cited in the report. Here&#8217;s what&#8217;s been said:<\/p>\n<ul>\n<li>Amazon called the information untrue and doubled down on the statement by saying it was also untrue it had worked with or provided information to the FBI regarding malicious hardware.<\/li>\n<li>Apple said they had repeatedly and consistently refuted every aspect of Bloomberg\u2019s story during pre-publication verification efforts, and refute virtually every aspect of the article now.<\/li>\n<li>Supermicro denied most, if not all, aspects of the Bloomberg story.<\/li>\n<li>China\u2019s Ministry of Foreign Affairs indicated the government intrusion into the product supply chain would violate China\u2019s commitment to the proposal of the 2011 <a href=\"https:\/\/www.riverpublishers.com\/pdf\/ebook\/chapter\/RP_9788793609563C11.pdf\" target=\"_blank\" rel=\"noopener\">International Code of Conduct for Information Security<\/a>.<\/li>\n<li>And the United States Department of Homeland Security <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-07\/dhs-backs-u-s-tech-companies-denying-china-hacked-their-systems\" target=\"_blank\" rel=\"noopener\">said<\/a> it had no reason to question denials by US technology companies (though this doesn\u2019t really refute the claims).<\/li>\n<\/ul>\n<p>To further muddle the information, the only two named technology experts have backpedaled their statements since publication.<\/p>\n<p>Joe Grand, cited hardware hacker and founder of Grand Idea Studio, Inc., claimed in a recent Twitter post that his quote was given over a year ago and broadly relating to the ultimate story.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25829\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/attachment\/joegrand\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand.png\" data-orig-size=\"914,408\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"joegrand\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-300x134.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-600x268.png\" class=\"aligncenter size-large wp-image-25829\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-600x268.png\" alt=\"\" width=\"600\" height=\"268\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-600x268.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-300x134.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand-604x270.png 604w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/joegrand.png 914w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In a fascinating podcast on <a href=\"https:\/\/risky.biz\/RB517_feature\/\" target=\"_blank\" rel=\"noopener\">Risky.biz<\/a>, Joe Fitzpatrick, founder of Hardware Security Resources, expressed concerns regarding the accuracy of the reporting, and claims his statements were taken out of context. In an email exchange provided by Fitzpatrick and read aloud on the Risky.biz <a href=\"http:\/\/media2.risky.biz\/RB517_feature.mp3\" target=\"_blank\" rel=\"noopener\">podcast<\/a>, Fitzpatrick expresses skepticism to Bloomberg reporters over the financial cost and scalability of the device.<\/p>\n<p>\u201cThe whole setup doesn\u2019t really make sense,\u201d the email is quoted as saying. \u201cIt just doesn&#8217;t make sense to spend the time and money to do what you are describing. Are you sure that the person who did the analysis had actual hardware knowledge and understanding?\u201d Fitzpatrick concludes, \u201cI\u2019m incredibly skeptical.\u201d<\/p>\n<p>So basically, all of the reporting on this story fell apart post-publication, and everyone involved has denied the aspects of the story. Oops!<\/p>\n<h3>Supply chain attacks are real<\/h3>\n<p>Even though Bloomberg may (or may not) have got the details wrong on this one, the scenario the story brings up is entirely plausible\u2014though maybe not with the sensationalism portrayed in the article. In fact, supply chain compromises, hardware faults, and outright counterfeits are not at all uncommon. There have been numerous events across the globe that highlight the dangers that audit-free software and single points of failure can introduce.<\/p>\n<p>Just last year, the popular Ukrainian tax software Medoc was subject to a compromised update that went out automatically to millions of customers. The attack resulted in the distribution of the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/malware-threat-analysis\/2017\/07\/all-this-eternalpetya-stuff-makes-me-wannacry\/\" target=\"_blank\" rel=\"noopener\">EternalPetya ransomware<\/a>.<\/p>\n<p>Earlier this year, popular PC cleaner CCleaner was <a href=\"https:\/\/www.darkreading.com\/endpoint\/privacy\/chinese-apt-backdoor-found-in-ccleaner-supply-chain-attack\/d\/d-id\/1331250?\" target=\"_blank\" rel=\"noopener\">victim<\/a> of an advanced APT backdoor that came as part of a software supply chain attack. In this multi-thronged attack, threat actors infected 2.27 million users in the first stage. After analyzing the collected information for high-value targets, only 40 were chosen for second-stage attacks and additional espionage efforts.\u00a0This type of concentrated effort shows the extent attackers are willing to go to infect high-value and potentially lucrative industries and organizations.<\/p>\n<p>Let\u2019s also not forget that Edward Snowden <a href=\"https:\/\/www.infoworld.com\/article\/2608141\/internet-privacy\/snowden--the-nsa-planted-backdoors-in-cisco-products.html\" target=\"_blank\" rel=\"noopener\">detailed<\/a> an NSA program that alleged backdoors planted in Cisco products allowed for spying on 20 billion communications each day\u2014or the <a href=\"https:\/\/www.theregister.co.uk\/2015\/02\/17\/kaspersky_labs_equation_group\/\" target=\"_blank\" rel=\"noopener\">allegations<\/a> that the NSA compromised hard drive manufacturers from all over the world to install malware that remained undetected for as long as two decades.\u00a0Or how <a href=\"https:\/\/www.wired.com\/2013\/06\/nsa-whistleblower-klein\/\" target=\"_blank\" rel=\"noopener\">Mark Klein<\/a> detailed secret, unmarked rooms at AT&amp;T from which covert spying operations were being run.<\/p>\n<p>And this doesn\u2019t even touch on the countless vulnerabilities, IOT botnets, default password attacks, or the many other vectors that can be used to launch malware toward systems, peripherals, routers, and other hardware devices we use on a daily basis.<\/p>\n<p>Unfortunately, few of these devices or systems are covered by security solutions that can protect from or remediate the unwanted code and malicious behaviors.<\/p>\n<p>But don\u2019t be fooled. This doom and gloom isn\u2019t just isolated to high-tech computer components and state-sponsored spying. Nor is the problem isolated to components originating from specific geographic regions.<\/p>\n<p>Due to deep supply chains and razor-thin profit margins, consumers face risks every day when at the checkout counter. Consumables can be compromised, either knowingly or not, and with malicious intent or not, in any one of the many downstream transports. This relates to everything from cheap computers and phones purchased from <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/qvmkdd\/counterfeit-iphone-x-review-and-teardown\" target=\"_blank\" rel=\"noopener\">third-party markets<\/a>\u00a0all the way down to pet food and <a href=\"https:\/\/heizerrenderom.wordpress.com\/2018\/04\/30\/om-in-the-news-e-coli-and-the-lettuce-supply-chain\/\" target=\"_blank\" rel=\"noopener\">lettuce<\/a> that you buy from your local supermarket. Even the vehicle you drive may have <a href=\"http:\/\/www.autonews.com\/article\/20130415\/OEM01\/304159936\/airbag-recall-shows-risk-of-global-supply-chains\">faults<\/a> attributable to supply-chain issues.<\/p>\n<p>There have been millions of instances where food, phones, computers, manufacturing goods, and virtually every other product known to man have shipped with vulnerabilities or been susceptible to supply-chain tampering.<\/p>\n<h3>So what do we do?<\/h3>\n<p>Admittedly, that\u2019s a tough nut to crack.<\/p>\n<p>Few in the security industry possess the necessary skills to comprehend\u2014let alone reverse engineer\u2014malicious hardware components that are deliberately designed to look like obscure, legitimate hardware components and are hidden within pin-point modules. And do any of us have the time or desire to understand the inner workings of the devices and systems we purchase? Okay, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2018\/09\/security-portable-router-inside-hardware\/\" target=\"_blank\" rel=\"noopener\">perhaps a few do<\/a>.<\/p>\n<p>To make matters worse, there aren\u2019t any security products on the market that have the capability to protect against the sort of sophisticated and targeted attack outlined in the Bloomberg report. To steal a quote from the article: \u201cThis stuff is at the cutting edge of the cutting edge, and there is no easy technological solution.\u201d<\/p>\n<p>Regardless of the device or the origin of the product, businesses and consumers alike need to perform due diligence when purchasing devices and products. The risk tolerance may need to be assessed to determine if a particular service or product is worth the potential detriment of losing sensitive information\u2014or other valuable data, time, and peace of mind.<\/p>\n<p>Businesses may wish to conduct hardware security audits on newly-acquired equipment to check for suspicious behavior. IT departments should also consider rolling out updates and patches in staggered succession to monitor for flaws or undesirable effects, thus isolating these problems to a few machines rather than the entire company. And, of course, adopting early technologies should be off-limits for security-conscious enterprises as these products have not yet received the scrutiny of the security community.<\/p>\n<p>How can consumers and businesses truly protect themselves, then? The real answer is \u201cthey can\u2019t.\u201d Consumers can never be 100 percent assured the devices and software they buy will be completely harmless.<\/p>\n<p>Without the ability to analyze and reverse-engineer every single device and bit of code that is used, customers have few fail-safe methodologies to ensure their products are free of defect. They must simply research, use common sense, and trust that they&#8217;re aligning themselves with products and companies that take the privacy and security of their customers seriously.<\/p>\n<p>Aligning with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/10\/malwarebytes-is-a-champion-of-national-cyber-security-awareness-month\/\" target=\"_blank\" rel=\"noopener\">security best practices<\/a>, doing due diligence, and conducting a cost\/benefit analysis are all good suggestions to follow. But also in this case, maybe crossing your fingers and saying a prayer is just as viable a suggestion.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/\">Bloomberg blunder highlights supply chain risks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Adam McNeil| Date: Wed, 10 Oct 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/' title='Bloomberg blunder highlights supply chain risks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/shutterstock_1063738295.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true\u2014and what, if anything, can be done to stop it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon\/\" rel=\"tag\">amazon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bloomberg\/\" rel=\"tag\">Bloomberg<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/blunder\/\" rel=\"tag\">blunder<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hardware\/\" rel=\"tag\">hardware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microchip\/\" rel=\"tag\">microchip<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/signal-conditioning-coupler\/\" rel=\"tag\">signal conditioning coupler<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/supermicro\/\" rel=\"tag\">Supermicro<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/supply-chain\/\" rel=\"tag\">supply chain<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/' title='Bloomberg blunder highlights supply chain risks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/10\/bloomberg-blunder-supply-chain-risks\/\">Bloomberg blunder highlights supply chain risks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[5588,2211,11555,19829,4503,3919,17081,19830,19831,10744,17237],"class_list":["post-13550","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amazon","tag-apple","tag-bloomberg","tag-blunder","tag-cybercrime","tag-hacking","tag-hardware","tag-microchip","tag-signal-conditioning-coupler","tag-supermicro","tag-supply-chain"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13550"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13550\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13550"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}