How to Combat Supply Chain Attacks

We sat down with our IT Security & Operations Director to learn what they think about the rise of supply chain attacks, what is behind this trend and how you can protect your supply chain against them.
Q: What is at the root of these attacks?
A: Think about a company like Lockheed Martin—a major DoD contractor, a government prime contractor and a multibillion-dollar corporation that invests hundreds of millions, if not billions, in security. Targeting them directly is challenging for threat actors because of their substantial security measures.
These attackers are shifting their focus down the supply chain, targeting Lockheed Martin’s direct customers, vendors and partners who may not have strong IT security defenses. Once compromised, they can use these smaller entities as entry points to work their way up the supply chain.
Q: What are some of the tactics these threat actors are using?
A: Threat actors have become increasingly inventive with a tactic known as Adversary-in-the-Middle (AitM) attacks. In these attacks, they send a phishing link that leads to a website designed to proxy the login request back to Office 365 or your Identity Provider (IDP). The user thinks they’re logging into a legitimate site, but really it’s a phishing site stealing their login credentials.
Q: What are some strategies manufacturers can use to protect against supply chain attacks?
A: First, my advice to organizations is to prioritize investing in IT security from the outset. Often, security is considered an afterthought until a significant breach occurs. Investing in IT and security proactively ensures your internal teams are well-resourced to defend against evolving threats and reduces the risk of having to address a major incident reactively.
Training your end users is also critical, especially in industries like manufacturing, where the workforce isn’t primarily composed of IT or security experts. These are the people most often targeted by attackers.
Empowering your employees with the knowledge to recognize common threats and ensuring they understand that if something feels off—like unusual language in an email from a regular contact or an unexpected request—they should report it immediately to IT for further investigation.
Manufacturers should prioritize planning for incident response and disaster recovery. Having a solid incident response plan ensures that when an attack occurs, you’re not left scrambling to determine the next steps. This preparation allows you to act swiftly and effectively, minimizing damage and maintaining business continuity.
Q: Do security tools like firewalls still work?
A: Yes. Firewalls remain a crucial element of network security, serving as the frontline defense for all internet traffic. It’s essential to maintain robust protections such as Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), DNS filtering and Zero Trust Architecture.
Additionally, implementing micro-segmentation in your network architecture is vital. This strategy ensures that if a threat does breach your defenses, its impact is contained to a specific segment rather than compromising your entire operation.
By segmenting your network, you limit the blast radius, minimizing potential damage and protecting your broader infrastructure.
Looking to improve your own supply chain security?
Connect with one of our specialists today to learn how our inventory management system, SupplySight™, can improve your supply chain.