ARTICLE
10 November 2021

Cybercriminals Are Targeting Supply Chain Open Source!

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
ReversingLabs.com posted a White Paper that stated that "Hackers are rational actors; they want to accomplish their goals using the least amount of effort possible.
United States Technology

ReversingLabs.com posted a White Paper that stated that “Hackers are rational actors; they want to accomplish their goals using the least amount of effort possible. Attacking proprietary applications can be hard work.  Hackers need to conduct research – ideally by obtaining a copy of the software – then attempt to find weaknesses they can exploit.” The October 14, 2021 White Paper titled “How to Mitigate Software Supply Chain Risk” included these comments:

After years of attacking networks and custom software, enterprising hackers found an easier attack vector and switched to attacking the application development process itself. Even better, attackers need not break into an organization's source repository. Instead, they simply add their malicious code to common open source projects used by organizations and wait for the developers to add the code to proprietary applications themselves.

For years criminals and hackers have used open source to distribute malicious code. Since anyone can create and distribute open source software, criminals can submit updates to well-known packages hoping maintainers will miss the malicious code, or offer to help with continued maintenance of a project. Even more straightforward is to create a project with a plausibly similar project name that is fully under the criminal's control. The package can be entirely bogus or a clone of a well-known project but with select hidden malicious characteristics.

By infecting the Open Source, the responsibility for Breach moves onto Application Developers who are no longer an innocent victim but rather unsuspecting accomplices.

No surprise about the risks of Open Source!

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More