July 23, 2018 By David Bisson 2 min read

Security researchers recently observed a malware campaign that leverages a particular type of USB drive to target specific Windows machines.

The threat group Tick may have exploited poor supply chain security to modify USB drives, according to a June 2018 report from Palo Alto Networks Unit 42. This possible attack is just the latest in a long line of malware campaigns targeting supply chains — a trend that can be largely attributed to the fact that many vendors don’t have proper security protocols in place.

What can organizations do to ensure their third-party suppliers are protected from vulnerabilities that might expose enterprise networks to malware?

Are Supply Chain Flaws to Blame for Tick Attacks?

The Tick group attempts to trick victims into installing a Trojanized version of a software that downloads SymonLoader malware onto machines running either Windows XP or Windows Server 2003, according to the report. Upon installation, the malware begins monitoring for a specific type of secure USB drive made by a South Korean defense company. If it detects this USB drive, SymonLoader extracts an unknown executable file from the device and runs it on the local disk.

The report noted that the Tick group likely incorporated a secure USB drive into its campaign to target air-gapped computers not connected to the web. Even so, the researchers admitted that they’re unsure how Tick compromised the USB drives in the first place.

“Because we do not have either a compromised USB drive or the unknown malicious file, we are also unable to determine how these USB drives have been compromised,” the report stated. “Specifically, we do not know if there has been a successful compromise in the supply chain making these devices, or if these have been compromised post-manufacturing and distributed using other means such as social engineering.”

How Can Companies Improve Supply Chain Security?

If the Tick group did indeed infect organizations through their supply chains, it would hardly be the first-time threat actors used this tactic. Last year, more than 2 million users who installed a security application were infected with a multistage malware attack that researchers believe originated in the provider’s supply chain.

According to F-Secure, threat groups have also used this tactic to prey on organizations operating industrial control systems (ICSs). When these threats are successful, it’s often because third-party suppliers and vendors fail to implement adequate security to protect connections to enterprise networks.

In fact, a July 2017 CybSafe report found one in seven small to midsize enterprises have no security protocols in place.

In light of these risks, IBM experts advise organizations to carefully review cloud configurations and ensure that all data accessible to third-party suppliers is protected with strong encryption. Security leaders should also ensure that enterprise password, patch management and data protection policies extend to all suppliers connecting to corporate networks and consider investing in data loss prevention (DLP), cloud access security broker (CASB) and security information and event management (SIEM) solutions to more closely monitor third-party access.

Sources: Palo Alto Networks, F-Secure, CybSafe

More from

CISA adds Microsoft SharePoint vulnerability to the KEV Catalog

3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The CISA press release states that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”However, Microsoft identified and released a patch for this vulnerability in July 2024. Cybersecurity experts are…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today