<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? — Krebs on Security</title>
	<atom:link href="http://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 09:52:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1699979</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Dec 2020 13:25:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1699979</guid>
		<description><![CDATA[https://techcrunch.com/2020/12/29/how-the-pandemic-revealed-the-fragility-of-supply-chains/?tpcc=ECFB2020]]></description>
		<content:encoded><![CDATA[<p><a href="https://techcrunch.com/2020/12/29/how-the-pandemic-revealed-the-fragility-of-supply-chains/?tpcc=ECFB2020" rel="nofollow">https://techcrunch.com/2020/12/29/how-the-pandemic-revealed-the-fragility-of-supply-chains/?tpcc=ECFB2020</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1699118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 17 Dec 2020 06:10:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1699118</guid>
		<description><![CDATA[SolarWinds’ Update Server Could Be Accessed in 2019 Using Password ‘solarwinds123′: Report
https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986

SolarWinds’ update server was accessible by using the simple password “solarwinds123″ in late 2019, according to a security researcher.

News broke on Sunday that SolarWinds’ OrionIT product was hacked as far back as March, with malware added to a software update that was downloaded by thousands of clients. The cyberattack went undetected for months, compromising the computers at top federal government agencies and potentially impacting hundreds of prominent American corporations.

As the damage continues to be investigated, experts have begun pointing to concerns about potentially substandard security protocols. Security researcher Vinoth Kumar told Reuters he alerted SolarWinds last year that its update server could easily be accessed by anyone using the simple password: “solarwinds123.”

“This could have been done by any attacker, easily,” Kumar told the news agency.

Kumar initially told Newsweek that the issue had been present for more than three weeks before it was fixed. After this article published, the researcher followed-up to say that he’d discovered the problem appeared to be present all the way back in June 2018.

Alleged Russian SolarWinds Hack ‘Probably an 11′ On Scale of 1 to 10, Cybersecurity Expert Warns
https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606

Acybersecurity expert warned that the alleged Russian hack of SolarWinds software, which affected top government agencies, is “probably an 11″ in terms of seriousness on a scale of one to 10]]></description>
		<content:encoded><![CDATA[<p>SolarWinds’ Update Server Could Be Accessed in 2019 Using Password ‘solarwinds123′: Report<br />
<a href="https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986" rel="nofollow">https://www.newsweek.com/solarwinds-update-server-could-accessed-2019-using-password-solarwinds123-report-1554986</a></p>
<p>SolarWinds’ update server was accessible by using the simple password “solarwinds123″ in late 2019, according to a security researcher.</p>
<p>News broke on Sunday that SolarWinds’ OrionIT product was hacked as far back as March, with malware added to a software update that was downloaded by thousands of clients. The cyberattack went undetected for months, compromising the computers at top federal government agencies and potentially impacting hundreds of prominent American corporations.</p>
<p>As the damage continues to be investigated, experts have begun pointing to concerns about potentially substandard security protocols. Security researcher Vinoth Kumar told Reuters he alerted SolarWinds last year that its update server could easily be accessed by anyone using the simple password: “solarwinds123.”</p>
<p>“This could have been done by any attacker, easily,” Kumar told the news agency.</p>
<p>Kumar initially told Newsweek that the issue had been present for more than three weeks before it was fixed. After this article published, the researcher followed-up to say that he’d discovered the problem appeared to be present all the way back in June 2018.</p>
<p>Alleged Russian SolarWinds Hack ‘Probably an 11′ On Scale of 1 to 10, Cybersecurity Expert Warns<br />
<a href="https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606" rel="nofollow">https://www.newsweek.com/alleged-russian-solarwinds-hack-probably-11-scale-1-10-cybersecurity-expert-warns-1554606</a></p>
<p>Acybersecurity expert warned that the alleged Russian hack of SolarWinds software, which affected top government agencies, is “probably an 11″ in terms of seriousness on a scale of one to 10</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1699034</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 06:06:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1699034</guid>
		<description><![CDATA[https://threatpost.com/windows-trojan-steals-browser-credentials-outlook-files/162223/ New Windows Trojan Steals Browser Credentials, Outlook Files]]></description>
		<content:encoded><![CDATA[<p><a href="https://threatpost.com/windows-trojan-steals-browser-credentials-outlook-files/162223/" rel="nofollow">https://threatpost.com/windows-trojan-steals-browser-credentials-outlook-files/162223/</a> New Windows Trojan Steals Browser Credentials, Outlook Files</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1699033</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 06:02:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1699033</guid>
		<description><![CDATA[I thought this was the best ‘plain English’ summary of what’s happening. Of course the Cozy Bear link is still speculative but it makes good headlines...

~18,000 organizations downloaded backdoor planted by Cozy Bear hackers
Russia-backed hackers use supply chain attack to infect public and private organizations.
https://arstechnica.com/information-technology/2020/12/18000-organizations-downloaded-backdoor-planted-by-cozy-bear-hackers/

About 18,000 organizations around the world downloaded network management tools that contained a backdoor that a nation state used to install malware in organizations the used the software, the tools provider, SolarWinds, said on Monday.

The disclosure from Austin, Texas-based SolarWinds, came a day after the US government revealed a major security breach hitting federal agencies and private companies. The US Departments of Treasury, Commerce, and Homeland Security departments were among the federal agencies on the receiving end of hacks that gave access to email and other sensitive resources, Reuters reported. Federal agencies using the software were instructed on Sunday to disconnect systems that run the software and perform a forensic analysis of their networks.

Security firm FireEye, which last week disclosed a serious breach of its own network, said that hackers backed by a nation-state compromised a SolarWinds software update mechanism and then used it to infect selected customers who installed a backdoored version of the company’s Orion network management tool.

The backdoor infected customers who installed an update from March to June of this year, SolarWinds said in a document filed on Monday with the Securities and Exchange Commission. The implant “was introduced as a result of a compromise of the Orion software build system and was not present in the source code repository of the Orion products,” Monday&#039;s filing said. SolarWinds, which said it has about 300,000 Orion customers, put the number of affected customers at about 18,000.

“SolarWinds by its nature has very privileged access to other parts of your infrastructure,” Chapple, a former computer scientist at the National Security Agency, said in an interview. “You can think of SolarWinds as having the master keys to your network, and if you’re able to compromise that type of tool, you’re able to use those types of keys to gain access to other parts of the network. By compromising that, you have a key basically to unlock the network infrastructure of a large number of organizations.”

The hacks are part of what the federal government and officials from FireEye, Microsoft, and other private companies said was a widespread espionage campaign that a sophisticated threat actor was carrying out through a supply chain attack.

In blog post FireEye published Sunday night, the company said it uncovered a global intrusion campaign that used the backdoored SolarWinds’ update mechanism as an initial entryway “into the networks of public and private organizations through the software supply chain.” Publications—including The Washington Post and The New York Times—cited unnamed government officials saying Cozy Bear, a hacking group believed to be part of the Russian Federal Security Service (FSB) was behind the compromises.]]></description>
		<content:encoded><![CDATA[<p>I thought this was the best ‘plain English’ summary of what’s happening. Of course the Cozy Bear link is still speculative but it makes good headlines&#8230;</p>
<p>~18,000 organizations downloaded backdoor planted by Cozy Bear hackers<br />
Russia-backed hackers use supply chain attack to infect public and private organizations.<br />
<a href="https://arstechnica.com/information-technology/2020/12/18000-organizations-downloaded-backdoor-planted-by-cozy-bear-hackers/" rel="nofollow">https://arstechnica.com/information-technology/2020/12/18000-organizations-downloaded-backdoor-planted-by-cozy-bear-hackers/</a></p>
<p>About 18,000 organizations around the world downloaded network management tools that contained a backdoor that a nation state used to install malware in organizations the used the software, the tools provider, SolarWinds, said on Monday.</p>
<p>The disclosure from Austin, Texas-based SolarWinds, came a day after the US government revealed a major security breach hitting federal agencies and private companies. The US Departments of Treasury, Commerce, and Homeland Security departments were among the federal agencies on the receiving end of hacks that gave access to email and other sensitive resources, Reuters reported. Federal agencies using the software were instructed on Sunday to disconnect systems that run the software and perform a forensic analysis of their networks.</p>
<p>Security firm FireEye, which last week disclosed a serious breach of its own network, said that hackers backed by a nation-state compromised a SolarWinds software update mechanism and then used it to infect selected customers who installed a backdoored version of the company’s Orion network management tool.</p>
<p>The backdoor infected customers who installed an update from March to June of this year, SolarWinds said in a document filed on Monday with the Securities and Exchange Commission. The implant “was introduced as a result of a compromise of the Orion software build system and was not present in the source code repository of the Orion products,” Monday&#8217;s filing said. SolarWinds, which said it has about 300,000 Orion customers, put the number of affected customers at about 18,000.</p>
<p>“SolarWinds by its nature has very privileged access to other parts of your infrastructure,” Chapple, a former computer scientist at the National Security Agency, said in an interview. “You can think of SolarWinds as having the master keys to your network, and if you’re able to compromise that type of tool, you’re able to use those types of keys to gain access to other parts of the network. By compromising that, you have a key basically to unlock the network infrastructure of a large number of organizations.”</p>
<p>The hacks are part of what the federal government and officials from FireEye, Microsoft, and other private companies said was a widespread espionage campaign that a sophisticated threat actor was carrying out through a supply chain attack.</p>
<p>In blog post FireEye published Sunday night, the company said it uncovered a global intrusion campaign that used the backdoored SolarWinds’ update mechanism as an initial entryway “into the networks of public and private organizations through the software supply chain.” Publications—including The Washington Post and The New York Times—cited unnamed government officials saying Cozy Bear, a hacking group believed to be part of the Russian Federal Security Service (FSB) was behind the compromises.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1695826</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 09:04:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1695826</guid>
		<description><![CDATA[Quantifying Complexity: The Challenges of Supply Chain Security
https://www.eetimes.com/quantifying-complexity-the-challenges-of-supply-chain-security/]]></description>
		<content:encoded><![CDATA[<p>Quantifying Complexity: The Challenges of Supply Chain Security<br />
<a href="https://www.eetimes.com/quantifying-complexity-the-challenges-of-supply-chain-security/" rel="nofollow">https://www.eetimes.com/quantifying-complexity-the-challenges-of-supply-chain-security/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1689982</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 12:36:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1689982</guid>
		<description><![CDATA[5 Essential Post-COVID Actions for Supply-Chain Businesses
https://www.designnews.com/industry/5-essential-post-covid-actions-supply-chain-businesses?ADTRK=InformaMarkets&amp;elq_mid=14273&amp;elq_cid=876648

Rethinking and remaking the supply chains, production, financial markets and global economies to be resilient will be essential. But how? 

How can businesses perform better in this new world and become more resilient for the next crisis? Put differently, how can companies ensure their survival while contributing to the safeguard of their respective economies? According to Verzelen, five things must happen:

    Employees must be protected.
    Financial health must be maintained.
    Marketing and sales must be adaptive.
    The supply chain must be safeguarded.
    The ecosystem must be helped.]]></description>
		<content:encoded><![CDATA[<p>5 Essential Post-COVID Actions for Supply-Chain Businesses<br />
<a href="https://www.designnews.com/industry/5-essential-post-covid-actions-supply-chain-businesses?ADTRK=InformaMarkets&#038;elq_mid=14273&#038;elq_cid=876648" rel="nofollow">https://www.designnews.com/industry/5-essential-post-covid-actions-supply-chain-businesses?ADTRK=InformaMarkets&#038;elq_mid=14273&#038;elq_cid=876648</a></p>
<p>Rethinking and remaking the supply chains, production, financial markets and global economies to be resilient will be essential. But how? </p>
<p>How can businesses perform better in this new world and become more resilient for the next crisis? Put differently, how can companies ensure their survival while contributing to the safeguard of their respective economies? According to Verzelen, five things must happen:</p>
<p>    Employees must be protected.<br />
    Financial health must be maintained.<br />
    Marketing and sales must be adaptive.<br />
    The supply chain must be safeguarded.<br />
    The ecosystem must be helped.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1689803</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 05:26:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1689803</guid>
		<description><![CDATA[Over the past two years, the global supply chain has been hit with two major upheavals: the United States-China trade war and, more cataclysmically, COVID-19.

https://techcrunch.com/2020/08/17/how-tech-can-build-more-resilient-supply-chains/?tpcc=ECFB2020]]></description>
		<content:encoded><![CDATA[<p>Over the past two years, the global supply chain has been hit with two major upheavals: the United States-China trade war and, more cataclysmically, COVID-19.</p>
<p><a href="https://techcrunch.com/2020/08/17/how-tech-can-build-more-resilient-supply-chains/?tpcc=ECFB2020" rel="nofollow">https://techcrunch.com/2020/08/17/how-tech-can-build-more-resilient-supply-chains/?tpcc=ECFB2020</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1688770</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 21 Aug 2020 18:29:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1688770</guid>
		<description><![CDATA[Apple scoffed at Bloomberg claims that its servers were compromised by a surreptitious component. But the truth is, the printed circuit board supply chain is quite vulnerable.

Three Ways to Hack a Printed Circuit Board
https://spectrum.ieee.org/computing/hardware/three-ways-to-hack-a-printed-circuit-board]]></description>
		<content:encoded><![CDATA[<p>Apple scoffed at Bloomberg claims that its servers were compromised by a surreptitious component. But the truth is, the printed circuit board supply chain is quite vulnerable.</p>
<p>Three Ways to Hack a Printed Circuit Board<br />
<a href="https://spectrum.ieee.org/computing/hardware/three-ways-to-hack-a-printed-circuit-board" rel="nofollow">https://spectrum.ieee.org/computing/hardware/three-ways-to-hack-a-printed-circuit-board</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-3/#comment-1676796</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 29 Apr 2020 10:20:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1676796</guid>
		<description><![CDATA[We Built the Supply Chain We Wanted … Not the One Needed
https://www.eetimes.com/we-built-the-supply-chain-we-wanted-not-the-one-needed/

The lessons of COVID-19 may be numerous but one stands out. The global supply chain is skewed towards one part of the world. This represents a great danger to everyone. If this wasn’t clear before, despite attempts by some to point out the dangers of this imbalance, it is now obvious the system needs to be corrected. And corrected it will be. Globally, and by the different regions.

The price of production outsourcing to China is too high. Today, it is measured in the loss of lives  — by the tens of thousands. The expected cost-efficiencies cannot be justified anymore.]]></description>
		<content:encoded><![CDATA[<p>We Built the Supply Chain We Wanted … Not the One Needed<br />
<a href="https://www.eetimes.com/we-built-the-supply-chain-we-wanted-not-the-one-needed/" rel="nofollow">https://www.eetimes.com/we-built-the-supply-chain-we-wanted-not-the-one-needed/</a></p>
<p>The lessons of COVID-19 may be numerous but one stands out. The global supply chain is skewed towards one part of the world. This represents a great danger to everyone. If this wasn’t clear before, despite attempts by some to point out the dangers of this imbalance, it is now obvious the system needs to be corrected. And corrected it will be. Globally, and by the different regions.</p>
<p>The price of production outsourcing to China is too high. Today, it is measured in the loss of lives  — by the tens of thousands. The expected cost-efficiencies cannot be justified anymore.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/06/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it-krebs-on-security/comment-page-2/#comment-1669454</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Feb 2020 18:43:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179922#comment-1669454</guid>
		<description><![CDATA[How to Effectively Combat Emerging Supply Chain Vulnerabilities
https://pentestmag.com/how-to-effectively-combat-emerging-supply-chain-vulnerabilities/

The supply chain is almost impossible to adequately defend, but there is a strategic way forward.

Imagine you vet a third-party chat bot vendor and after rigorous testing and multiple levels of approval, they are now authorized to be a point of presence on your website. You did it! Now you can check the box and call it a day, right? Well, not quite. Let’s assume that vendor gets breached, and the hackers use the trusted relationship the vendor has cultivated with you to their advantage (remember, the vendor passed all the rigorous testing).]]></description>
		<content:encoded><![CDATA[<p>How to Effectively Combat Emerging Supply Chain Vulnerabilities<br />
<a href="https://pentestmag.com/how-to-effectively-combat-emerging-supply-chain-vulnerabilities/" rel="nofollow">https://pentestmag.com/how-to-effectively-combat-emerging-supply-chain-vulnerabilities/</a></p>
<p>The supply chain is almost impossible to adequately defend, but there is a strategic way forward.</p>
<p>Imagine you vet a third-party chat bot vendor and after rigorous testing and multiple levels of approval, they are now authorized to be a point of presence on your website. You did it! Now you can check the box and call it a day, right? Well, not quite. Let’s assume that vendor gets breached, and the hackers use the trusted relationship the vendor has cultivated with you to their advantage (remember, the vendor passed all the rigorous testing).</p>
]]></content:encoded>
	</item>
</channel>
</rss>
