top | item 17640546

Compromised supply chain within a supply chain poses new risks

76 points| ccnafr | 7 years ago |cloudblogs.microsoft.com | reply

17 comments

order
[+] sologoub|7 years ago|reply
In compiled/installed software, the concept of “supply chain risk” is at least a thing that companies are aware of. However, when it comes to web software, I have not heard many companies really conceptualize their “supply chain” exposure from the myriad of scripts/dependencies injected via tag managers and other software.

And it’s not just tag managers (GTM/DTM, etc) - React create app command builds a boilerplate with hundreds of packages as dependency.

Has anyone employed any kind of automated scanning to try and catch known malicious code in these?

On the tag manager front, I’m afraid the very premise of letting non-technical people manage code is what makes these a built-in vulnerability. Educating those in control as to risks seems to be the only option, in addition to normal malware scanning you have to do if you run ads.

[+] patrickmn|7 years ago|reply
> I have not heard many companies really conceptualize their “supply chain” exposure from the myriad of scripts/dependencies injected via tag managers and other software.

I made a thing called "TrackerMap" that allowed people, mostly Fortune 500 web/risk/compliance people, to do just that: https://www.crownpeak.com/products/monitoring-solutions/tag-...

(It has since been acquired, and I have no affiliation.)

[+] mjevans|7 years ago|reply
The 'supply chain' of docker and other sandboxed 'exact versions' request-able environments scare me.

Horrid 'enterprisy' java applications showed everyone how bad things could get and those same mistakes are being replicated instead of learned from.

[+] scarface74|7 years ago|reply
The article also stated that the malware being a part of an installation utility gave it basically the Windows equivalent of riot access. Why does any normal app need root access?
[+] jacques_chester|7 years ago|reply
Supply chain attacks are one of my personal nightmares.

However, on the bright side, cryptominers are continuing to perform a public service by providing non-destructive whole-lifecycle penetration testing on a contingent-fee basis.

[+] walterbell|7 years ago|reply
Which components/stack/supplychain is used by most crypto-miners?
[+] mey|7 years ago|reply
Another supply chain I worry about is package management. Maven, NPM, NuGet, etc.
[+] amelius|7 years ago|reply
> The app vendor’s systems were unaffected.

The vendor doesn't test their software in its entirety?

[+] steve19|7 years ago|reply
The packages served to the vendor could be legit, but packages served to everyone else is compromised. The vendor would never know there was a problem.