{"id":90528,"date":"2020-02-03T09:00:30","date_gmt":"2020-02-03T17:00:30","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90528"},"modified":"2023-05-15T23:02:41","modified_gmt":"2023-05-16T06:02:41","slug":"guarding-against-supply-chain-attacks-part-2-hardware-risks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/03\/guarding-against-supply-chain-attacks-part-2-hardware-risks\/","title":{"rendered":"Guarding against supply chain attacks\u2014Part 2: Hardware risks"},"content":{"rendered":"
The challenge and benefit of technology today is that it\u2019s entirely global in nature. This reality is brought into focus when companies assess their supply chains, and look for ways to identify, assess, and manage risks across the supply chain of an enterprise. Part 2 of the \u201cGuarding against supply chain attacks\u201d blog series examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft\u2019s role in reducing hardware-based attacks.<\/p>\n
A labyrinth of companies produces mobile phones, Internet of Things (IoT) devices, servers, and other technology products that improve our lives. Product designers outsource manufacturing to one or more vendors. The manufacturer buys components from known suppliers. Each supplier buys parts from its preferred vendors. Other organizations integrate firmware. During peak production cycles, a vendor may subcontract to another company or substitute its known parts supplier with a less familiar one. This results in a complex web of interdependent companies who aren\u2019t always aware that they are connected.<\/p>\n
Tampering with hardware is not an easy path for attackers, but because of the significant risks that arise out of a successful compromise, it\u2019s an important risk to track. Bad actors compromise hardware by inserting physical implants into a product component or by modifying firmware. Often these manipulations create a \u201cback door\u201d connection between the device and external computers that the attacker controls. Once the device reaches its final destination, adversaries use the back door to gain further access or exfiltrate data.<\/p>\n
But first they must get their hands on the hardware. Unlike software attacks, tampering with hardware requires physical contact with the component or device.<\/p>\n
<\/a><\/p>\n So how do they do it? There are two known methods: interdiction and seeding. In interdiction, saboteurs intercept the hardware while it\u2019s on route to the next factory in the production line. They unpackage and modify the hardware in a secure location. Then they repackage it and get it back in transit to the final location. They need to move quickly, as delays in shipping may trigger red flags.<\/p>\n As hard as interdiction is, it\u2019s not nearly as challenging as seeding. Seeding attacks involve the manipulation of the hardware on the factory floor. To infiltrate a target factory, attackers may pose as government officials or resort to old fashioned bribery or threats to convince an insider to act, or to allow the attacker direct access to the hardware.<\/p>\n Given how difficult hardware manipulation is, you may wonder why an attacker would take this approach. The short answer is that the payoff is huge. Once the hardware is successfully modified, it is extremely difficult to detect and fix, giving the perpetrator long-term access.<\/p>\n For more insight into why supply chains are vulnerable, how some attacks have been executed, and why they are so hard to detect, we recommend watching Andrew \u201cbunny\u201d Huang\u2019s presentation, Supply Chain Security: If I were a Nation State\u2026<\/a>, at BlueHat IL, 2019.<\/p>\n What can you do to limit the risk to your hardware supply chain? First: identify all the players, and ask important questions:<\/p>\n Once you know who all the vendors are in your supply chain, ensure they have security built into their manufacturing and shipping processes. The National Institute of Standards and Technology<\/a> (NIST) recommends that organizations \u201cidentify those systems\/components that are most vulnerable and will cause the greatest organizational impact if compromised.\u201d Prioritize resources to address your highest risks. As you vet new vendors, evaluate their security capabilities and practices as well as the security of their suppliers. You may also want to formalize random, in-depth product inspections.<\/p>\n As a big player in the technology sector, Microsoft engages with its hardware partners to limit the opportunities for malicious actors to compromise hardware.<\/p>\n Here are just a few examples of contributions Microsoft and its partners have made:<\/p>\n Project Cerberus<\/a> is a collaboration that helps protect, detect, and recover from attacks on platform firmware.<\/p>\n <\/a><\/p>\n The \u201cGuarding against supply chain attacks\u201d blog series untangles some of the complexity surrounding supply chain threats and provides concrete actions you can take to better safeguard your organization. Read Part 1: The big picture<\/a> for an overview of supply chain risks.<\/p>\n Also, download the Seven properties of secure connected devices<\/a> and read NIST\u2019s Cybersecurity Supply Chain Risk Management<\/a>.<\/p>\n Stay tuned for these upcoming posts:<\/p>\n In the meantime, bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Part 2 examines the hardware supply chain, its vulnerabilities, how you can protect yourself, and Microsoft\u2019s role in reducing hardware-based attacks.<\/p>\n","protected":false},"author":96,"featured_media":90531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3687],"products":[],"threat-intelligence":[3737],"tags":[3822,3809],"coauthors":[2180,1896],"class_list":["post-90528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-threat-intelligence","threat-intelligence-supply-chain-attacks","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nWhy attack hardware?<\/h3>\n
\n
Know your hardware supply chain<\/h3>\n
\n
Microsoft\u2019s role securing the hardware supply chain<\/h3>\n
\n
Learn more<\/h3>\n
\n