Unveiling the Secrets: How Procurement Challenges Illuminate the World of Commercial Software

Published:

The Storm-0558 Breach: A Wake-Up Call for Software Supply Chain Security

In the middle of 2023, a significant cybersecurity incident unfolded, revealing vulnerabilities in one of the most widely used platforms in the world: Microsoft Exchange Online. A threat actor known as Storm-0558, believed to be linked to the government of the People’s Republic of China, successfully compromised the email accounts of over 500 individuals across 22 organizations globally, including key players in the U.S. federal government. This breach not only exposed sensitive information but also highlighted the urgent need for enhanced software supply chain security.

The Breach Unveiled

The breach came to light in mid-June when the U.S. Department of State detected suspicious activity in several employees’ Outlook Web Access accounts. Initially, it was assumed that the compromise stemmed from a breach of a State Department system. However, further investigation revealed a more alarming truth: the attackers had accessed the email accounts directly through Microsoft’s Outlook Web Access portal, indicating a breach of Microsoft’s systems rather than a U.S. government platform.

According to a report published by the U.S. government’s Cyber Safety Review Board (CSRB) in April 2024, the attackers utilized a compromised Microsoft Services Account (MSA) cryptographic key, which had been retired in 2021. This key allowed Storm-0558 to sign access tokens, effectively masquerading as legitimate Outlook users. The exact method by which the threat actors obtained this key remains a mystery, underscoring the complexities and challenges of securing software supply chains.

The Growing Risks of Software Supply Chains

The Storm-0558 incident serves as a stark reminder of the vulnerabilities inherent in software supply chains. As organizations increasingly rely on third-party software, the risks associated with these dependencies have escalated. A report by Blue Voyant found that a staggering 93% of companies have experienced a cybersecurity breach due to weaknesses in their supply chain or third-party vendors. These vulnerabilities can arise from various threats, including malware insertion, code tampering, and the gradual deterioration of software security over time—a phenomenon known as “software rot.”

In light of these risks, security teams must broaden their focus beyond merely patching software vulnerabilities or addressing flaws in open-source software. The breach of Microsoft Exchange Online illustrates that commercial software represents a significant and often under-addressed attack surface within enterprises. Business leaders must prioritize understanding the security posture of the commercial software they rely on, moving from a reactive to a proactive approach in safeguarding their organizations.

The Challenge of Detection

The sophistication of threat actors like Storm-0558 highlights a troubling trend: the abandonment of traditional attack vectors, such as account takeovers or exploitation of known vulnerabilities. Instead, these actors are increasingly targeting critical components of the software supply chain, such as signing keys and code repositories, to achieve their objectives while evading detection.

In the cases of Microsoft Exchange Online, SolarWinds’ Orion, and 3CX’s desktop application, attackers manipulated software supply chain components to further their goals. Unfortunately, many software producers lack the necessary tools to monitor and detect suspicious activity within their software, leaving both producers and their customers vulnerable to exploitation.

Regulatory Responses and Industry Recommendations

In response to the rising threat landscape, the federal government has begun implementing policies that place the responsibility for software supply chain security (SSCS) on software producers. The Executive Order on Improving the Nation’s Cybersecurity (EO 14028) and the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design Pledge emphasize the importance of comprehensive SSCS principles. Additionally, the Food and Drug Administration (FDA) has mandated that medical device manufacturers produce software bills of materials (SBOMs) for their products, enhancing transparency and accountability.

Industry experts are increasingly advocating for security leaders to strengthen their SSCS programs and incorporate supply chain security assessments into the commercial software procurement process. A recent report from Gartner, titled “Leader’s Guide to Software Supply Chain Security,” highlighted that many existing SSCS efforts among enterprises are often uncoordinated. The report urged security leaders to pay closer attention to software supply chain attacks, including those targeting proprietary and commercial code, which pose significant security, regulatory, and operational risks.

Conclusion: A Call to Action

The Storm-0558 breach serves as a critical wake-up call for organizations worldwide. As cyber threats continue to evolve, the need for robust software supply chain security has never been more pressing. Security leaders must ask themselves not only whether they are aware of potential vulnerabilities but also whether they should have known about them. By prioritizing transparency, accountability, and proactive security measures, organizations can better protect themselves against the growing risks associated with software supply chains.

In a world where the stakes are continually rising, it is imperative for both public and private entities to recognize that securing the software and services that underpin modern organizations is not just an IT issue—it is a fundamental business imperative.

Related articles

Recent articles