Modern Australian
Men's Weekly

.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

  • Written by Richard Matthews, PhD Candidate, University of Adelaide

If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates.

Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices.

On the evening of Friday the 24th of October 2008 Richard C. Schaeffer Jr, the NSA’s top computer systems protection officer was in a briefing with US President George W. Bush when an aide passed him a note. The note was brief and to the point. They had been hacked.

How did it happen? The culprit was a simple USB.

Read more: Australia's car industry needs cybersecurity rules to deal with the hacking threat

USB supply chain attacks

The attack was unexpected because classified military systems are not connected to outside networks. The source was isolated to a worm loaded onto a USB key that had been carefully set up and left in large numbers to be purchased from a local internet kiosk.

This is an example of a supply chain attack, which focuses on the least secure elements in an organisation’s supply chain.

The US military immediately moved to ban USB drives in the field. Some years later, the US would use the same tactic to breach and disrupt Iran’s nuclear weapons program in an attack that has now been dubbed Stuxnet.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it The Bushehr nuclear power plant in Iran is thought to have been infected with a malicious computer worm known as Stuxnet in 2010. ABEDIN TAHERKENAREH/AAP

The lesson is clear: if you are plugging USB drives into your systems, you need to be very sure where they came from and what’s on them.

If a supplier can get a secret payload onto a USB stick, then there is no safe period in which a USB is a good choice. For example, you can currently buy a USB stick that is secretly a small computer, and it will, on insertion, open up a window on your machine and play the Death Star march.

This is just one kind of supply chain attack. What are the other kinds?

Network supply chain attacks

Computer users have an increasing tendency to store all their information on a network, concentrating their assets in one place. In this scenario, if one computer is compromised then the entire system is open to an attacker.

Consider a conference phone used in your organisation. Suppose this network-enabled phone had a built in fault that would allow attackers to listen in on any conversations in the vicinity. This was the reality in 2012 when more than 16 versions of Cisco’s popular IP phone were affected. Cisco released a patch for their phones, which could be installed by most companies’ IT security departments.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it The basic model of a network supply chain attack shows how vulnerable interconnected systems are within an organisation. Author Supplied

In 2017, a similar issue arose when a brand of hospital grade dishwasher was affected by a built-in insecure web server. In the case of a hospital, there is a great deal of private data and specialist equipment that could be compromised by such a vulnerability. While a patch was eventually released, it required a specialised service technician to upload it.

Read more: Guarding against the possible Spectre in every machine

Supply chain attacks have recently been implicated in the disastrous failure rate of the North Korean missile program. David Kennedy, in a video for The Insider, discusses how the US has previously disrupted nuclear programs using cyber. If they still possess this capability, it’s possible they would wish to keep it covert. Should this be the case, it’s conceivable one of the numerous North Korean failures could have been a test of such a cyber weapon.

Five ways companies can protect themselves

To protect yourself against all of this you need to set up basic cyber hygiene processes that can help keep your business free from infection.

  1. Purchase and install good anti-virus software and run it in protective mode, where it scans everything on your machine. Yes, even Macs get viruses

  2. monitor who is on your network, avoid using untrusted devices such as USBs and have your administrators block autorun as a system-wide policy

  3. segregate your networks. Have critical plant infrastructure? Don’t have it on the same network as your day to day, public-facing or guest access networks

  4. update regularly. Don’t worry about the latest and greatest issues, patch the known vulnerabilities in your systems – especially that one from 1980

  5. pay for your software and labour. If you’re not paying for the product, then someone is paying for you as the product.

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it By separating your critical infrastructure from the internet facing and supplier available networks it is possible to provide a level of protection. However, some attacks are able to bridge this ‘air gap’. Author Provided

Cyber awareness is crucial

Finally, you can maximise cyber resilience by training everyone in your organisation to learn new skills. But it’s vital to test whether your training is working. Use actual exercises – in conjunction with security professionals – to examine your organisation, practice those skills, and work out where you need to make improvements.

Read more: Everyone falls for fake emails: lessons from cybersecurity summer school

The price of any connection to the internet is that it’s vulnerable to attack. But as we’ve shown, not even standalone systems are safe. Deliberate practice and thoughtful approaches to security can increase the protection of your business or workplace.

Authors: Richard Matthews, PhD Candidate, University of Adelaide

Read more http://theconversation.com/how-suppliers-of-everyday-devices-make-you-vulnerable-to-cyber-attack-and-what-to-do-about-it-98254

Fertility Treatment in Australia | Expert Reproductive Care

One of the most significant journeys in life is the formation or the development of a family. To most couples and individuals, conception, however, ...

Professional Bathroom Builders Sydney: What Defines Professional Standards

Professional bathroom builders in Sydney operate within a regulated construction environment that prioritises safety, compliance, and structural durab...

Retail Cleaning Creating Welcoming and Professional Store Environments

First impressions matter in retail, and cleanliness plays a powerful role in shaping how customers perceive a store. Retail cleaning focuses on mai...

Why Year 12 Tutoring Plays A Crucial Role In Academic Success

The final year of school is one of the most demanding periods in a student’s academic journey, which is why year 12 tutoring has become an essent...

Legal Remedies Available in a Breach of Contract Case

When a contract is broken, the consequences can affect cash flow, reputation and ongoing business relationships. A breach of contract may occur when...

Long Weekend Camping in the Yarra Ranges: Three Weekends of High Country Adventure

Yarra Ranges National Park, Victoria. Image by Mattinbgn (talk · contribs), CC BY 3.0, via Wikimedia CommonsVictoria’s Yarra Ranges offer keen trav...

Why Waste Management Solutions Are Essential For Modern Businesses

Managing waste responsibly has become a critical priority for organisations of all sizes, which is why waste management solutions play such an impo...

The Importance and Varieties of Ride-On Mower Tyres

Ride-on mowers are built to manage larger lawns with consistency and control. The quality and design of ride on mower tyres play a critical role in ...

Gain Peace Of Mind: The Undeniable Benefits Of A Ready First Aid Kit

Life in our vibrant communities, whether it's the bustling city or the quiet country town, is full of unexpected moments. From a scraped knee on the...

The Most Common Conveyor System Issues in Manufacturing

In modern manufacturing, conveyor systems play a central role in keeping production lines efficient, consistent, and cost-effective. When they operate...

How to Secure a Long-Term Rental in a Competitive Market

The rental market can be unpredictable and may present challenges if you’re not prepared. Initially, you might submit numerous applications and stil...

What Smart Investors Know About Real Estate

Many people think investing in property is just about buying a house and waiting for it to get expensive. While that can happen, the people who actual...

The Benefits of Seeking Help for Anxiety and Stress

Anxiety and stress have become common experiences in today’s fast-paced world, affecting people across all ages and lifestyles. From work pressures ...

How to Make the Most of Fashion Wholesale Options for Your Brand

If you want to grow a fashion brand without constantly reinventing the wheel, wholesale can be one of the smartest ways to scale. The key is knowing h...

How to Add Value to Your Home Before Selling

Selling a home is not just about putting up a sign and waiting for offers. It is about presenting a property that buyers instantly connect with and ar...

How Outdoor Play Enhances Learning and Wellbeing

You don’t need to be an expert to conclude that play is an essential part of growing up. When children aren’t restricted and kept indoors, they de...

How to Build Passive Income Through Real Estate

Building passive income is one of the most effective ways to create long-term financial security. While there are many investment opportunities availa...

DIY Guide to Replacing Small Parts in Your Laundry Machine

Finding a puddle or a broken washer is frustrating, but you don’t always need a professional. Many common issues are caused by tiny parts that are c...