Home
%3CLINGO-SUB%20id%3D%22lingo-sub-220383%22%20slang%3D%22en-US%22%3EAttack%20inception%3A%20Compromised%20supply%20chain%20within%20a%20supply%20chain%20poses%20new%20risks%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-220383%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fuploads%2Fprod%2F2018%2F07%2FFig3-Supply-chain-attack-diagram-3.png%22%20border%3D%220%22%20%2F%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EA%20new%20software%20supply%20chain%20attack%20unearthed%20by%20Windows%20Defender%20Advanced%20Threat%20Protection%20emerged%20as%20an%20unusual%20multi-tier%20case.%20Unknown%20attackers%20compromised%20the%20shared%20infrastructure%20in%20place%20between%20the%20vendor%20of%20a%20PDF%20editor%20application%20and%20one%20of%20its%20software%20vendor%20partners%2C%20making%20the%20app%E2%80%99s%20legitimate%20installer%20the%20unsuspecting%20carrier%20of%20a%20malicious%20payload.%20The%20attack%20seemed%20like%20just%20another%20example%20of%20how%20cybercriminals%20can%20sneak%20in%20malware%20using%20everyday%20normal%20processes.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20plot%20twist%3A%20The%20app%20vendor%E2%80%99s%20systems%20were%20unaffected.%20The%20compromise%20was%20traceable%20instead%20to%20a%20second%20software%20vendor%20that%20hosted%20additional%20packages%20used%20by%20the%20app%20during%20installation.%20This%20turned%20out%20to%20be%20an%20interesting%20and%20unique%20case%20of%20an%20attack%20involving%20%E2%80%9Cthe%20supply%20chain%20of%20the%20supply%20chain%E2%80%9D.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERead%20the%20full%20blog%20post%20here%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmulti-tier-supply-chain-attack%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAttack%20inception%3A%20Compromised%20supply%20chain%20within%20a%20supply%20chain%20poses%20new%20risks%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

 

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one of its software vendor partners, making the app’s legitimate installer the unsuspecting carrier of a malicious payload. The attack seemed like just another example of how cybercriminals can sneak in malware using everyday normal processes.

 

The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out to be an interesting and unique case of an attack involving “the supply chain of the supply chain”.

 

Read the full blog post here: Attack inception: Compromised supply chain within a supply chain poses new risks