Supply Chain Attack

Revision as of 19:22, 23 July 2021 by Jessica (talk | contribs) (Created page with "FIle:Fig1-Solorigate-attack-chain.png|650px|right|Solorigate malware infection chain ([https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromise...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

A Supply Chain Attack is when a threat actor makes use of unsecured network protocols, unprotected server infrastructures, or unsafe coding practices. The supply chain attacker breaks in, changes source codes, and hides malware in build and update processes.[1]

Solorigate malware infection chain (Flowchart from Microsoft Security blog)
Solorigate malware infection chain (Flowchart from Microsoft Security blog)

References