<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Supply Chain Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/supply-chain/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/supply-chain/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 08 Jul 2021 16:25:03 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Supply Chain Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/supply-chain/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 086 Supply Chain Hacks</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 01:15:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<category><![CDATA[Independent Assessment]]></category>
		<category><![CDATA[Kaseya]]></category>
		<category><![CDATA[Kaseya Hack]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[REvil]]></category>
		<category><![CDATA[REvil Ransomware]]></category>
		<category><![CDATA[Sodinokibi]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[SolarWinds Hack]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Hacks]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2564</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks. This sounds familiar Back in #WeekendWisdom number 41, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred. What are these supply chain hacks you speak of? The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 86. This week were going to talk about Supply Chain Hacks.<span id="more-2564"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2564-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/" target="_blank" rel="noopener">#WeekendWisdom number 41</a>, I talked about supply chain risks. Since then there have been a couple of massive global supply chain hacks that have occurred.</p>
<h3>What are these supply chain hacks you speak of?</h3>
<p>The first one was late last year. The SolarWinds hack was revealed. SolarWinds makes network monitoring software that are used by large corporates and government agencies.</p>
<p>But for my audience, which will be the more smaller business owner, something happened last week. A company called Kaseya, they provide software for IT managed service providers who obviously look after the IT for their customers which are usually small businesses. This software enables those managed service providers to be able to remotely manage and control their client&#8217;s devices.</p>
<h3>What happened with the Kaseya hack?</h3>
<p>Well Kaseya were hacked and had their client&#8217;s devices were ransomed by the REvil ransomware gang. Now REvil claim that they have infected a million devices around the globe and they&#8217;re looking for $70 million to free up these devices. The whole story is still playing out, so we don&#8217;t know the full details of it yet.</p>
<h3>What can you do about this type of risk?</h3>
<p>But how would you, as a small business owner, be able to try and protect yourself from such a supply chain hack?</p>
<p>Well you really do need to make sure that any third party that is going to put some kind of service or device or software into your network, into your environment, to carry out a full, thorough due diligence on that supplier and their application.</p>
<p>If you don&#8217;t have the capability in-house, there&#8217;s plenty of people out there in the market and in the business that will be able to provide you with an independent assessment.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-086-supply-chain-hacks/">#WeekendWisdom 086 Supply Chain Hacks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-086-lo.mp4" length="37504000" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 041 Supply Chain Risk</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 23:05:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Supply Chain Risk]]></category>
		<category><![CDATA[Target Hack]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2257</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 41. This week we&#8217;re going to talk about Supply Chain Risk. I hear from a number of small business owners who say &#8220;I&#8217;m too small. There would be nobody interested in hacking me.&#8221; How does a Supply Chain Risk occur? Criminals may not be interested in hacking that business. But if&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/">#WeekendWisdom 041 Supply Chain Risk</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 41. This week we&#8217;re going to talk about Supply Chain Risk.<span id="more-2257"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2257-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4</a></video></div>
<p>I hear from a number of small business owners who say &#8220;I&#8217;m too small. There would be nobody interested in hacking me.&#8221;</p>
<h3>How does a Supply Chain Risk occur?</h3>
<p>Criminals may not be interested in hacking that business. But if they find out that that business has a big customer that they are more interested in, things might change. What they might try and do is compromise the security of that small business so they be able to get in through them, to the big customer. So that&#8217;s where they&#8217;re trying to get into the supply chain for their actual victim.</p>
<h3>Can you give me a for example?</h3>
<p>A great example of this type of supply chain risk occurred back in late 2013. Target, the large US retail company had all of their payment card terminals in their stores compromised. These had malware installed on them. That enabled them to steal up to 40 million payment card details from customers over the Black Friday weekend and subsequent shopping weeks leading up to Christmas.</p>
<h3>What did the hackers do?</h3>
<p>What had happened was, the criminals sent a phishing email to the Heating, Ventilation, Air Conditioning maintenance company that Target used. They compromised their computers there. They were able to find the network logon ID and password for the work order processing and invoicing system for Target. The criminals were then able to use those logon details to be able to gain access to Target systems and spread the malware.</p>
<p>So that&#8217;s what can happen to small businesses who have big customers.</p>
<p>Moral of the story: Small businesses do need to have good security in place too.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>. We can also talk to you about best practice for security in your #SmallBusiness in order to prevent you becoming a Supply Chain Risk.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-041-supply-chain-risk/">#WeekendWisdom 041 Supply Chain Risk</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-041-lo.mp4" length="24580973" type="video/mp4" />

			</item>
		<item>
		<title>The Chinese hacking server hardware</title>
		<link>https://www.l2cybersecurity.com/chinese-hacking-server-hardware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 15:25:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[Hardware Hacking]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1428</guid>

					<description><![CDATA[<p>You may have heard some pretty scary headlines or stories recently about a Bloomberg Businessweek article. This was about the Chinese hacking server hardware by implanting little &#8220;bugs&#8221; onto the main electronic boards of the servers. The claims, from several anonymous sources, were that this was happening on a vast scale. The Chinese had infiltrated&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/chinese-hacking-server-hardware/">The Chinese hacking server hardware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1429" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware-150x150.jpg" alt="Chinese hacking server hardware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Chinese-hacking-server-hardware.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You may have heard some pretty scary headlines or stories recently about a <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies" target="_blank" rel="noopener">Bloomberg Businessweek article</a>. This was about the Chinese hacking server hardware by implanting little &#8220;bugs&#8221; onto the main electronic boards of the servers. <span id="more-1428"></span>The claims, from several anonymous sources, were that this was happening on a vast scale. The Chinese had infiltrated SuperMicro, a manufacturer of these electronics boards. Every server that was shipped to approximately 30 US companies including Apple and Amazon had this little bug. Photos of a pencil and a little chip were doing the rounds. All very frightening indeed.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1430 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek.jpg" alt="The supposed size of the chinese bug" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Bloomberg-Businessweek-150x150.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<h3>Haven&#8217;t we heard about this kind of behaviour from China before?</h3>
<p>That was my first reaction to this story. Back in 2012, the <a href="https://www.reuters.com/article/us-usa-china-huawei-zte/u-s-lawmakers-seek-to-block-china-huawei-zte-u-s-inroads-idUSBRE8960NH20121008" target="_blank" rel="noopener">US Government set out to ban</a> any US telecommunications operator from using equipment supplied by Chinese companies Huawei and ZTE. This was after reports of communications equipment manufactured by them and supplied to US companies, were detected sending large packs of data back to China late at night.</p>
<h3>But doesn&#8217;t the US do this as well?</h3>
<p>Indeed thanks to the likes of Edward Snowden, we became aware that <a href="https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/" target="_blank" rel="noopener">the NSA behaves similarly</a>. In that story, they are shown to have intercepted the shipment of a new communications router. They then implanted some spying capability into it. It was then sent it on it&#8217;s way to it&#8217;s final destination.</p>
<h3>So there&#8217;s nothing really new about the Chinese hacking server hardware?</h3>
<p>Well this story from Bloomberg has stirred up quite a lot of controversy within the information security community. Apple and Amazon have been quick to categorically state that they have not been compromised. They claimed the story was completely false. Patrick Gray, an Australian information security journalist, <a href="https://risky.biz/RB517_feature/" target="_blank" rel="noopener">interviewed one of the named sources</a> in the Bloomberg story. Joe Fitzpatrick had been quite uncomfortable with the published story. Gray also raised the fact a previous story by the same journalists, quoting anonymous sources, turned out to be false. So he reckons it&#8217;s a bogus story.</p>
<p>I personally don&#8217;t think China would take the big risk of implanting &#8220;spy chips&#8221; in the all of the electronics that their own huge manufacturing companies produce. It would be a strange thing to do on such a massive scale as it would be more easily detected. They&#8217;ve been more targeted in the past, as has the US, so that&#8217;s probably more normal.</p>
<p>Certainly the supply chain is one of the weak points in a product&#8217;s creation. That&#8217;s how we ended up with <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/" target="_blank" rel="noopener">Petya/Not Petya</a> and also <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/" target="_blank" rel="noopener">the compromise of CCleaner</a>.</p>
<p>If you are in a top secret, research and development type operation, then you will need to have suitably vetted hardware, software and physical security experts on payroll or contract to be able to protect your business from these kind of efforts of the Chinese hacking server hardware.</p>
<p>For the rest of us mere mortals, there is little we can do to truly protect ourselves, without going to great expense. We just have to hope we have nothing the Chinese, the US, the UK, the Russians, the Israelis, etc., etc., etc. want. If they want it bad enough, they&#8217;ll get it.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/chinese-hacking-server-hardware/">The Chinese hacking server hardware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
