Ransomware Actors Target Attractive Supply Chains


Ransomware Actors Target Attractive Supply Chains

By Greg Tavarez

Ransomware will continue to be an ongoing headache for security teams, especially as corporate attack surfaces expand with digital investments. The main motive for bad actors is that big payday that comes with ransomware attacks, and supply chains are essentially a gourmet dish.

In an attack scenario, the supply chain had an access vector that lacked the proper defensives, and ransomware actors then attacked many organizations through that single supplier. Past examples of supply chain breaches include Kaseya in 2021, which impacted 1,500-2,000 organizations, and SolarWinds in 2020, which compromised at least nine U.S. government departments.

Trend Micro research shows that 79% of global IT leaders believe their partners and customers make their organization a more attractive ransomware target. Furthermore, more than half of global organizations have a supply chain partner that was hit by ransomware.

Supply chain security improvements needs to start with transparency around cyber risk. However, less than half of organizations share knowledge about ransomware attacks with their suppliers, and a quarter say they don’t share threat information with partners.

On top of that, detection rates were low for ransomware activities:

  • Ransomware payloads (63%
  • Use of legitimate tooling (53%
  • Data exfiltration (49%)
  • Initial access (42%)
  • Lateral movement (31%)

Trend Micro laid out a plan to build a safer supply chain. A key step is to gain an understanding of the supply chain and corresponding data flows to identify high-risk suppliers. They should be regularly audited against industry baseline standards, and similar checks should be enforced before onboarding new suppliers

Again, there is no magical remedy to reduce ransomware risk, which is present in 25% of data breaches, a 13% year-on-year increase. But, as Trend Micro Technical Director Bharat Mistry said, enhanced visibility and control over the expanding digital attack surface is the first step toward mitigating ransomware risks.

Edited by Erik Linask

MSPToday Editor

Related Articles

Unifi Connects Employees to T-Mobile 5G Network

By: Greg Tavarez    9/28/2022

Unifi selected T-Mobile and Hyperion for a Managed Mobility program to give employees a personal 5G smartphone.

Read More

Teams Direct Routing for MSP Revenue

By: Gary Audin    9/27/2022

Team Direct Routing is a way to connect Microsoft's Phone System to the PSTN via an existing PBX, Unified Communications system, or a third-party tele…

Read More

End-User Privacy and Mobile Security Coexist in Q-Scout

By: Greg Tavarez    9/27/2022

Quokka believes end-user privacy and mobile security should coexist in a secure BYOD network and launched Q-Scout to provide proactive, privacy-first …

Read More

CrowdStrike Intros Partner Progam, Adds Elite Tier for Business Growth

By: Stefania Viscusi    9/27/2022

The CrowdStrike Powered Service Provider Program (CPSP) includes value-added solution bundles and is adding an elite tier to incentivize MSPs.

Read More

Escalating Ransomware Diminishes Organizations' Confidence

By: Greg Tavarez    9/26/2022

SpyCloud revealed in its "2022 Ransomware Defense Report" that 90% of organizations were affected by ransomware in some capacity over the past 12 mont…

Read More