最具破坏性的软件供应链攻击分析.pdf

编号:614147 PDF 15页 1.60MB 下载积分:VIP专享
下载报告请您先登录!

最具破坏性的软件供应链攻击分析.pdf

1、PROMIS Visit PROMIS promisedu.seAnalysis of the most destructive software supply chain attacksby Dr.Oleksandr Adamov and Dr.Oleksii BaranovskiySenior Lecturer BTH20 November 2024Professional Master in Information SecurityOnline Courses for Professionals in SecurityUpcoming Security Seminars and Even

2、ts Send an email to Monique Johansson mowbth.se to subscribe to our mailing list and stay up to date for PROMIS talks and events!CrowdStrike incident(19/07/2024)Types of supply chain attacksSupply chain compromise can take place at any stage of the supply chain including manipulation/compromise of:d

3、evelopment tools and environment;source code repositories(public or private);replacement of legitimate software;software update/distribution mechanisms;system images and containers.Sources:https:/csrc.nist.gov/CSRC/media/Projects/Supply-Chain-Risk-Management/documents/ssca/2017-winter/NCSC_Placemat.

4、pdf Types of supply-chain attacks by Microsoft1.Compromised software building tools or update infrastructure2.Stolen code-sign certificates or signed malicious apps using the identity of dev company3.Compromised specialized code shipped into hardware or firmware components4.Pre-installed malware on

5、devices(cameras,USB,phones,etc.)Source:https:/ NotPetya via M.E.Doc-2017Backdoor in MEDocs ZvitPublishedObjects.dllSource:https:/ C:Windowssystem32rundll32.exe C:Windowsperfc.dat,#1 30NotPetya via M.E.Doc-2017SolorigateSolarigate backdoor in SolarWinds Orion platform reported by FireEye on December

6、08,2020Source:https:/ attack via Kaseya VSA(2021)Targets:1000+organizationsNorwegian financial software developer Visma,who manages some systems for Swedish supermarket chain Coop.The supermarket chain had to close down its 800 stores for almost a week.Source:

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(最具破坏性的软件供应链攻击分析.pdf)为本站 (patton) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠