
Security in connections to OT devices in the energy industry
6 de March de 2025
IT Environment Security: On-Premises, Cloud, and Hybrid
20 de March de 2025All organizations rely on a network of suppliers and third parties that, in many cases, require access to external critical infrastructures. This dependence introduces new attack vectors. Cybercriminals exploit vulnerabilities in supplier security to infiltrate larger enterprises, compromise sensitive data, and disrupt business continuity. Therefore, cybersecurity in the supply chain must be a priority.
Real-World Supply Chain Attacks
Here are some of the most notable supply chain attacks:
1. SolarWinds (2020)
In the SolarWinds attack, threat actors successfully injected malicious code into an update of SolarWinds’ Orion software, impacting over 18,000 customers, including governments and major corporations. This highly sophisticated attack enabled cybercriminals to access critical systems of key organizations.
2. Target (2013)
In this case, attackers infiltrated Target’s network through a heating, ventilation, and air conditioning (HVAC) provider. Using compromised credentials, they stole data from 40 million credit cards.
3. NotPetya (2017)
NotPetya was a ransomware attack that spread rapidly via compromised Ukrainian accounting software, affecting organizations worldwide. The attack caused economic losses exceeding $10 billion.
Expanding Attack Methods via Suppliers
1. Credential Compromise
Weak or reused passwords in supplier accounts are among the most exploited vulnerabilities. Additionally, spear-phishing attacks targeting supplier employees are common, as many are not well-prepared to recognize social engineering threats. Cybercriminals also leverage previously leaked credentials to carry out brute-force attacks, systematically testing multiple password combinations to gain access.
Defense Techniques:
- Password Management: Use secure password management solutions to ensure credentials are complex and unique (Encrypted Vault).
- Multi-Factor Authentication (MFA): Implement MFA across all supplier accounts to add an extra layer of security.
2. Compromised Software
Attackers inject malware into legitimate software before it is distributed to users. This can include malicious software updates, where legitimate but compromised updates serve as a vehicle to distribute malware. Once users accept them, the malware installs itself within their systems.
Defense Techniques:
- Software Validation: Perform thorough integrity and authenticity checks before installing any software.
- Secure Software Development: Promote secure coding practices and conduct regular audits of used applications.
3. Insecure Connections
Using unencrypted protocols such as FTP, TELNET, and HTTP along with the lack of strong authentication in remote connections—provides cybercriminals with opportunities to intercept and manipulate data in transit. Additionally, unmonitored and unrestricted sessions increase the risk of attackers gaining persistent access to company systems.
Defense Techniques:
- Data Encryption: Always use secure protocols like SFTP, SSH, and HTTPS to protect data communication.
- Session Monitoring: Implement solutions that allow supervision and control of all remote access sessions.
Ensuring Supply Chain Security with Endurance
Endurance is a comprehensive and robust solution designed to protect internal company infrastructure through secure and controlled access. Here are some of its key features:
- Controlled Access
Suppliers do not have direct access to the internal network. Instead, they connect through a secure connection broker, acting as a control point for all external connections.
- Secured Remote Session
Suppliers only interact with authorized interfaces within an encapsulated remote session. This prevents internal systems from being exposed and sensitive data from being exfiltrated or modified.
- Asset Isolation
Only video, audio, keyboard, and mouse events are transmitted, eliminating the risk of malware injection or data leakage into company systems.
- Comprehensive Audit and Control
Every supplier action is logged, enabling real-time audits and corrective measures when necessary. This ensures full traceability of every access session.
- Enhanced Authentication
Endurance employs Multi-Factor Authentication (MFA) and context-based granular authorization, ensuring that only authorized users can access the necessary resources.
With Endurance, companies can safeguard their supply chain against security risks, prevent unauthorized access, and minimize exposure to cyberattacks targeting third-party vulnerabilities.