Friday, August 15, 2025

Test your threat blind spot

Does your enterprise actually perceive its dependencies, and tips on how to mitigate the dangers posed by an assault on them?

Supply-chain dependencies: Check your resilience blind spot

A panel dialogue at DEF CON 33 final week, titled “Adversaries at conflict: Techniques, applied sciences, and classes from trendy battlefields”, supplied a number of thought-provoking factors, in addition to a transparent takeaway: whereas digital techniques comparable to misinformation and affect campaigns are helpful in trendy battle, they aren’t going to win a conflict. That’s as a result of when bombs begin dropping and the bodily parts of conflict are below method, the misinformation spreading by digital channels turns into much less vital. Understandably, the victims of battle and people displaced have extra pressing priorities: meals, shelter and staying alive.

Turning the dialog as to whether a conflict may very well be received utilizing cyberattacks and digital disruption, there was additionally settlement among the many panelists that cyberattacks create non permanent harm, whereas a bomb touchdown on one thing is a simpler and lasting technique of destruction.

The assaults towards important infrastructure in Ukraine doubtlessly affirm this: Russia-aligned actors have launched quite a few cyberattacks towards the nation’s energy grid, leading to non permanent disruptions as methods may be rebuilt and made operational once more in a comparatively brief time frame. In the meantime, a bomb touchdown on an influence facility is prone to trigger long-term harm and limitation of service that might take months or years to revive. The large-picture conclusion on this a part of the panel dialogue is {that a} conflict can’t be received by cyber alone – it nonetheless must be received on the bodily battlefield.

Cyber and bodily safety

The dialogue then developed to how cyber impacts the bodily. One panelist made the remark to the impact that “a military can’t struggle in the event that they haven’t been fed”. Put in another way, as a rising variety of civilian contractors are getting used to offer the logistics wanted to function a military, making the assault floor broader than it could seem.

The panel used Taco Bell as a fictional analogy. A hacker may declare they modified the water provide in Taco Bell, however on nearer inspection it may simply be that they’ve tampered with a restaurant’s water cooler, which might not be sufficient to have an effect on its operations.

Nevertheless, a cyberattack on Taco Bell’s provide chain may convey it to an operational cease. How? By stopping deliveries of produce to the restaurant. This dependency may very well be much more obscure: an assault on the businesses that offer the meat utilized in Tacos may doubtlessly trigger Taco Bell to stop operations as a consequence of a scarcity of elements for meals. The analogy holds true for the army: with out meals, the troops can’t struggle or are, at finest, restricted.

What this implies for your enterprise

Shifting past the panel dialogue, this raises a important query for companies: do they actually perceive their dependencies to be operationally resilient? Do they perceive the dependency their prospects have on them to make sure the continued operation of their very own companies?

Sticking with the Taco Bell analogy, think about a cyberattack that takes away a key aspect the enterprise must function; for instance, if the corporate depends on a provider for taco seasoning, then a cyberattack towards the provider may have an effect on Taco Bell’s capability to maintain working. This isn’t mere hypothesis – there are real-world examples of cyberattacks which have precipitated the sort of disruption. For instance, the cyber-incident suffered by Change Healthcare, a well being knowledge processing agency, stopped medical companies being supplied throughout practices and hospitals.

As we speak, so far as I do know, cybercriminals solely extort cost from these they immediately assault. However what if a cybercriminal determined to assault the third social gathering after which demand an extortion cost from all the companies that depend on that provider? In my instance, say the taco seasoning firm is disrupted by ransomware, and whereas the cybercriminal could ask the seasoning firm to pay a requirement immediately, they could really acquire extra in the event that they requested cost from all the businesses reliant on the provider’s product, as a scarcity of provide could price them greater than the provider itself.

Whereas this monetization technique could seem speculative, there is a vital level right here: does your enterprise actually perceive its dependencies and tips on how to mitigate the chance of assault on these it’s depending on? An actual-world instance could be an assault on a catering firm that’s contracted to feed sufferers in a hospital. If the power to feed sufferers is disrupted as a consequence of a cyberattack, then the hospital could need to declare a serious incident and shut admissions to new sufferers. On this situation, would the hospital pay an extortion demand that brings again catering provide?

The important thing takeaway from this panel session for me is that this: all of us must map and totally perceive the dependencies we depend on and guarantee now we have resilience the place wanted. If we will’t get to some extent of resilience, then we at the least want to know the chance posed by the dependencies.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles