• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Software Supply Chain Attacks Are A Growing Threat

    October 3, 2022 Alex Woodie

    There’s a lot going on in the world right now, so you probably don’t need something more to worry about. But the cat-and-mouse world of cybersecurity never sleeps, and one of the threats keeping the good guys up at night right now is the growing risk of software supply chain attacks. Unfortunately, security through obscurity won’t provide as much protection for the IBM i server this time around.

    Just what is a software supply chain attack? According to the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA), a software supply chain attack occurs when “a cyber threat actor infiltrates a software vendor’s network and employs malicious code to compromise the software before the vendor sends it to their customers.”

    Software supply chain attacks can involve proprietary software as well as software that’s distributed via open source. It can take the form of malicious files surreptitiously added to vendor software update websites or open source repositories, or it can even involve the actual insertion of malicious code directly into otherwise innocent software products.

    Long anticipated by cybersecurity professionals as other avenues of attack were squeezed out, the first documented supply chain security attack occurred in 2014. That’s when Russian cybercriminals exploited vulnerabilities in the Web servers used by industrial control and SCADA system vendors to update customers systems.

    According to a 2014 Security Week story, the hackers used the vulnerabilities to install a remote access Trojan (RAT) named Havex in the updates for at least three ICS and SCADA vendors’ products. (SCADA systems, including those running on IBM i servers, apparently are prime targets for malevolent souls.)

    Software supply chain attacks provide a new vector for malware to infiltrate the enterprise. (Image source: NIST)

    After a few early successes, supply chain security attacks proliferated, with at least seven documented cases targeting various products in 2017, including the infamous notPetya attack, which originated with a Russian compromise of a popular tax product in Ukraine but quickly spread around the world. Other targets include Android and iOS operating systems and Python and JavaScript libraries, according to 2017 NIST paper titled Software Supply Chain Attacks. The Kaspersky antivirus software has also been implicated in supply chain attacks, according to the feds.

    Cybercriminals began using this novel method of corrupting victims’ systems because they “are an efficient way to bypass traditional defenses and compromise a large number of computers,” the NIST says in its paper. When they target well-known brands in enterprise software, like SolarWinds, which was the victim of a supply chain software attack in early 2021, they can use the trust that customers have in these vendors and their products against them.

    That’s a powerful force, the NIST says in its paper.

    “Software supply chain attacks are particularly bothersome and insidious because they violate the basic and assumed trust between software provider and consumer,” NIST says. “Customers have been correctly conditioned to buy and install software only from trusted sources and to download and use patches or updates only from authorized vendor sites. Now, customers must be wary of performing those basic, proper and prudent cybersecurity tasks when purchasing software and maintaining systems, since even authorized resources may be compromised.”

    The Log4j vulnerability that surfaced at the end of 2021 adds another twist to the software supply chain security saga. By itself, the Log4j flaw was bad enough–it landed a perfect 10 on the 10-point CVSS v3 rating scale. Exploiting the zero-day flaw in Log4j versions 2.0 and 2.14.1 is relatively easy for the moderately skilled cybercriminal.

    But because the open source logging framework is used so widely by other Java-based software, the flaw created a domino effect of security vulnerabilities in other products. Prominent IBM i products, like the heritage version of IBM i Navigator, contained the vulnerable version of Log4j and would not be updated, according to IBM.

    The damage didn’t stop there, as various other of IBM’s Java-based products for IBM i contained the vulnerable version of Log4j, including WebSphere Application Server, Integrated Web Services Server (IWS), Integrated Application Server (IAS). IBM i ACS, and OmniFind Text Search Server.

    The Log4j vulnerability is so pervasive that IBM maintains a list of products not impacted by it. That list contains more than 500 products not impacted by Log4j, and more than 230 that are impacted by it. Java is also widely used in the IBM i, including by many software vendors. However, it’s unknown how many of these vendor products were impacted by Log4.

    The fact that security vulnerabilities are emerging in otherwise trustworthy products is a cause for concern. But flaws in open source software may have a chilling effect in some emerging markets.

    In its April 2021 paper Defending Against Software Supply Chain Attacks, CISA described an attack that took place with PyPI, the popular Python Package Index. Researchers discovered 12 malicious libraries loaded into the PyPI distribution that used so-called “typosquatting” tactics. The attack led users who were thinking they were installing a popular Python library called django to instead download malicious clones with names like “djago” and “dajngo.”

    “The malicious libraries contained the same code and functionality of those they impersonated,” CISA wrote. “But they also contained additional functionality, including the ability to obtain boot persistence and open a reverse shell on remote workstations.”

    Not surprisingly, this has had a chilling effect on Python users. According to Python data science tool provider Anaconda, 40 percent of organizations it recently surveyed say they’re pulling back on their use of open source data science software due to security concerns.

    Python-based data science programs aren’t a huge driver of workloads on the IBM i, at least not yet. However, open source software is a growing driver of workloads on IBM i. The anything-goes nature of supply chain security attacks shows that nobody is safe, not even back-office systems like IBM i with a growing appetite for open source.

    RELATED STORIES

    IBM Accelerates New Nav Development Following Log4j Issue

    Critical Log4j Vulnerability Hits Everything, Including the IBM i Server

    SolarWinds Hack Raises Concern for IBM i Shops

    Is Information Overload Hurting IBM i Security?

    IBM i Data Vulnerable, Security Report Says

    Verizon Outlines Disturbing AS/400 Breach At Water District

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: cybersecurity, IAS, IBM i, IBM i ACS, Integrated Application Server, Integrated Web Services Server, IWS, Java, Log4j, OmniFind Text Search Server, Python

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: Aliases — Underused and Unappreciated IBM i 7.3 Loses Standard Support On September 30, 2023

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 65

This Issue Sponsored By

  • ProData
  • WorksRight Software
  • ARCAD Software
  • New Generation Software
  • Manta Technologies

Table of Contents

  • IBM i 7.3 Loses Standard Support On September 30, 2023
  • Software Supply Chain Attacks Are A Growing Threat
  • Guru: Aliases — Underused and Unappreciated
  • We Need Some Insight From You
  • IBM i PTF Guide, Volume 24, Number 40

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle