Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Throwback Attack: Ken Thompson lays the foundation for software supply chain attacks

  • Gary Cohen
  • January 20, 2022
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

If 2021 was the year of ransomware, 2022 may become the year of software supply chain attacks. The prevalence of supply chain attacks has skyrocketed, with several high-profile strikes such as SolarWinds and Kaseya making headlines. Because of the nature of these intrusions, they didn’t just impact those major companies, they also hit thousands of related organizations in both government and the private sector. But while these hits might be making more headlines, software supply chain attacks are nothing new.

The first such attack — or at least the foundation for modern software supply chain hacks — dates back to the early 1980s, when Ken Thompson injected a virus into a compiler. Thompson, a pioneer of computer science and creator of the Unix operating system, did not have malicious intent, but what became known as the Ken Thompson Hack still set the mold for modern cyber criminals and proved just how subversive software attacks could be.

The supply chain dilemma

A central tenet of cybersecurity has always been trust. The goal is to keep untrusted sources out of your networks, while allowing trusted allies the access they need. That’s why software supply chain attacks, where threat actors inject malicious code into what should be a trusted piece of software, are insidious and damaging. The massive SolarWinds attack alone left some 18,000 companies that used their Orion software vulnerable to hackers. This included everyone from the U.S. government to Fortune 500 firms.

Hackers are becoming savvy to how supply chain attacks can be very lucrative and often easier to pull off. In a recent article for Industrial Cybersecurity Pulse, Justin Fier of Darktrace posited that software supply chain attacks will become commonplace in the coming year.

“We predict that in 2022 we will see threat actors embed malicious software throughout the software supply chain, including in proprietary source code, developer repositories, open-source libraries and more,” he wrote.

So why are software supply chain attacks so worrying to cybersecurity experts? They offer hackers more bang for their buck. Why hack one company when you can hit hundreds of companies with a single keystroke? It can also be easier to target the weak link in a chain versus going after a major company like SolarWinds that is well defended and practices solid cyber hygiene.

“The thing about a supply chain attack is the attackers are attacking the weakest party in the link,” said Eric Byres, CTO of aDolus Technology and a leading authority in software supply chain security. “If you’re a large oil company, for example, you could have perfect security, do a fantastic job, but if just one of your suppliers is not holding up their part of the bargain, then you’re going to get attacked.”

The other factor that makes these supply chain hits so attractive to cyber criminals is few companies have taken steps to guard against them. They might know their own suppliers, but do they know who their suppliers’ suppliers are? Few, if any, pieces of software are made entirely in-house. They’re cobbled together using components from various sources. If just one of those sources was weak cybersecurity, that can open even the biggest companies up to risk.

“Honestly, supply chain risk has generally been just right off the radar,” Byres said. “The manufacturers of industrial equipment will tend to have a little bit more of a supply chain management plan, but usually it’s only one layer down. They know who they buy from, but they really don’t know who those suppliers buy from or where they get components. I know this firsthand because when I was working for Tofino, we sold Tofino [Firewalls] to all sorts of companies like Honeywell and Caterpillar and Schneider. And they knew they were buying from us, but they didn’t know what components we bought and put into those firewalls. And we didn’t know further down the chain.

“So the honest and sad answer is, until recently, supply chain management just was nonexistent in the software space. And this is a real game of catch-up going on right now.”

The Ken Thompson Hack

Ken Thompson is far from your standard black hat hacker. He is a renowned figure in computer science who spent much of his career working at Bell Labs, where he designed the original Unix operating system. His illustrious career began in the 1960s and spanned several decades, during which time he was recognized with a Turing Award and a National Medal of Technology, among other accolades.

“The moral is obvious. You can’t trust code that you did not totally create yourself.”

Thompson’s goal was to see if it was possible to hide a backdoor in Unix’s login function, according to an article in Wired. This theoretical attack inserted backdoor code into a compiler, so every time the login application was compiled, the compiler would insert the same malicious backdoor code.

“Thompson didn’t merely plant a piece of malicious code that granted him the ability to log into any system,” wrote Andy Greenberg in Wired. “He built a compiler — a tool for turning readable source code into a machine-readable, executable program — that secretly placed the backdoor in the function when it was compiled. Then he went a step further and corrupted the compiler that compiled the compiler, so that even the source code of the user’s compiler wouldn’t have any obvious signs of tampering.”

In 1983, Thompson and co-worker Dennis Ritchie received the Turing Award, often referred to as the Nobel Prize of computing, “For their development of generic operating systems theory and specifically for the implementation of the UNIX operating system.” In his Turing Award lecture, titled Reflections on Trusting Trust (also presented in the journal Communication of the ACM in August 1984), Thompson described his hack in detail, calling it “the cutest program I ever wrote.” The Ken Thompson Hack has been considered a seminal work in the field of computer security ever since.

At the end of his speech, he summed up the lesson of his hack.

“The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well-installed microcode bug will be almost impossible to detect.”

The future is now

While Thompson’s attack was more experimental in nature and didn’t harm anyone, savvy hackers are using his lessons today to plant malicious code into software and gain entry into a wide range of systems. As more and more companies rely on third-party vendors, their networks become susceptible to attack. Small- and medium-sized companies are now likely targets. Even if they aren’t the proverbial big game the hackers are really going after, these smaller companies can be used as a conduit to more profitable attacks on major players. In this environment, it becomes essential organizations focus not only on their own cyber hygiene, but also on the cyber hygiene of their “trusted” software suppliers.

So are software supply chain attacks the next frontier of cyber warfare? Byres said no, but not for a comforting reason.

“It’s not even the next; it is the frontier,” he said. “We’re here now. I gave a talk a little while ago saying, ‘God help us if ransomware meets supply chain attacks, because the ransomware people can just attack one company and get ransomware into 100 companies.’ And sure enough, Kaseya did that. … Taking advantage of one weak supplier of basically a network management package. And because all their customers trusted that they were getting good software, suddenly they were accepting what was effectively ransomware into their companies.”

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gary Cohen

Gary Cohen is senior editor/product manager at CFE Media.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • IT/OT

Five steps for OT endpoint security success

  • John Livingston
  • January 20, 2022
Read More
Next Article
Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
  • Facilities

Cybersecurity-centered systems and fundamentals

  • Damon Purvis
  • January 27, 2022
Read More
You May Also Like
Courtesy of: CFE Media and Technology
Read More

Throwback attack: The U.S. hits Russia with the first logic bomb attack

Cybersecurity Locks
Read More

Throwback attack: Kevin Poulsen wins a Porsche (and hacks the U.S. government)

Read More

Throwback Attack: Hacker steals source code for Half-Life 2 video game

Courtesy: CFE Media
Read More

Throwback Attack: Petya, the red skull of ransomware

Test 2 Alt Text
Read More

Throwback Attack: ILOVEYOU, a love letter no one wanted

Read More

Throwback Attack: The Morris Worm launches the first major attack on the internet

Image courtesy: Brett Sayles
Read More

Throwback Attack: Teamsters refuse to pay after Labor Day cyberattack

Read More

I’m sorry, we’re closed: Why most ransomware attacks happen out of hours

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT