Security researchers recently observed a malware campaign that leverages a particular type of USB drive to target specific Windows machines.

The threat group Tick may have exploited poor supply chain security to modify USB drives, according to a June 2018 report from Palo Alto Networks Unit 42. This possible attack is just the latest in a long line of malware campaigns targeting supply chains — a trend that can be largely attributed to the fact that many vendors don’t have proper security protocols in place.

What can organizations do to ensure their third-party suppliers are protected from vulnerabilities that might expose enterprise networks to malware?

Are Supply Chain Flaws to Blame for Tick Attacks?

The Tick group attempts to trick victims into installing a Trojanized version of a software that downloads SymonLoader malware onto machines running either Windows XP or Windows Server 2003, according to the report. Upon installation, the malware begins monitoring for a specific type of secure USB drive made by a South Korean defense company. If it detects this USB drive, SymonLoader extracts an unknown executable file from the device and runs it on the local disk.

The report noted that the Tick group likely incorporated a secure USB drive into its campaign to target air-gapped computers not connected to the web. Even so, the researchers admitted that they’re unsure how Tick compromised the USB drives in the first place.

“Because we do not have either a compromised USB drive or the unknown malicious file, we are also unable to determine how these USB drives have been compromised,” the report stated. “Specifically, we do not know if there has been a successful compromise in the supply chain making these devices, or if these have been compromised post-manufacturing and distributed using other means such as social engineering.”

How Can Companies Improve Supply Chain Security?

If the Tick group did indeed infect organizations through their supply chains, it would hardly be the first-time threat actors used this tactic. Last year, more than 2 million users who installed a security application were infected with a multistage malware attack that researchers believe originated in the provider’s supply chain.

According to F-Secure, threat groups have also used this tactic to prey on organizations operating industrial control systems (ICSs). When these threats are successful, it’s often because third-party suppliers and vendors fail to implement adequate security to protect connections to enterprise networks.

In fact, a July 2017 CybSafe report found one in seven small to midsize enterprises have no security protocols in place.

In light of these risks, IBM experts advise organizations to carefully review cloud configurations and ensure that all data accessible to third-party suppliers is protected with strong encryption. Security leaders should also ensure that enterprise password, patch management and data protection policies extend to all suppliers connecting to corporate networks and consider investing in data loss prevention (DLP), cloud access security broker (CASB) and security information and event management (SIEM) solutions to more closely monitor third-party access.

Sources: Palo Alto Networks, F-Secure, CybSafe

More from

Detecting Insider Threats: Leverage User Behavior Analytics

3 min read - Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% said the inability to audit user access is a security blind spot in their organizations. In addition, the 2023 X-Force Threat Intelligence Index reported that…

3 min read

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Increasingly Sophisticated Cyberattacks Target Healthcare

4 min read - It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, “Not only are cyber criminals more organized than they were in the past, but they are often more skilled and sophisticated.” Although not unanimous, the…

4 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read