Software supply chain attacks are not new, but as we’ve seen recently, if executed successfully they can have huge payoffs for sophisticated attackers. Detecting malicious code inserted into a trusted vendor’s security updates is extremely difficult to do at scale, and for most organizations, impractical given the time required to analyze updates vs. the increased risk of not applying security patches to vulnerable systems. This holds especially true if the software providers’ upstream update servers are compromised and used for command and control of infected victim systems, ruling out restricting egress connections only to the vendor from the customers’ update management systems.

The fact is, most organizations still struggle for months to detect malicious actors within their network who managed to gain a foothold from much more common attack vectors, such as compromising vulnerable systems exposed to the internet or spear phishing to gain a foothold. A more effective approach to combating software supply chain attacks is to focus on better prevention, detection, and response to the actions a threat actor will take after they gain a foothold. These actions, commonly referred to as Tactics, Techniques, and Procedures (TTPs), are the activities that threat actors perform to gather information about compromised systems and your internal network, laterally move between systems, elevate their permissions on the network, and achieve their primary objectives in compromising your network, stealing sensitive data or funds, causing service disruptions, establishing long term persistence, or modifying important data.

Selecting, deploying, configurating and tuning an effective detection security stack, however, can be a major undertaking even for mature blue teams. Breach after breach we have seen that the most effective attackers have the motivation and skillset to invest time in finding ways to evade and bypass individual security controls, including machine learning algorithms used by modern cloud based EDR. Ultimately, these “next-gen” tools may create a false sense of security as attackers continue the arms race of identifying innovative ways to fool the analytics intended to detect their activities.

Blue teams working with red teams

Effective blue teams work with red teams to invest time and energy in improving detection rules, verify and tune alerts, and give their staff opportunities to train with skilled red team partners and learn how advanced techniques are chained together to evade security controls and remain undetected for months.

Organizations have invested significantly in products, including “next-gen” firewalls, antivirus, EDR controls, user behavioral analytics tools, and SIEMs, but the majority do not sufficiently test the effectiveness of these stand-alone controls and how they perform together as a complete security stack against known threat actor attack paths or more advanced techniques.

Controls aside, many organizations struggle to conduct exercises that provide their blue teams, detection engineers, and threat hunters with realistic experiences and opportunities to tune their detection rules and identify gaps in their incident response playbooks. An effective blue team is an experienced blue team, and that experience should ideally be built upon working with a trusted partner, not as a result of a real-world breach. The best blue teams are empowered to understand how advanced attacks work step-by-step, including gaining awareness in the gaps of their security stack, the flow of suspicious events between multi-tier security analyst teams as they are identified and escalated to incidents, the gaps in current incident response playbooks, and the overall unpredictability that comes from an advanced attacker using new tools, techniques, or exploiting unpatched or 0-day vulnerabilities.

Adversary Simulation engagements can help you mature your security program and controls, as well as help reduce key metrics such as the blue team’s Mean-Time-To-Detect (MTTD) and Mean-Time-To-Respond (MTTR), by conducting exercises designed to use the same TTPs as sophisticated actors, explaining how the attacks work, and providing detailed recommendations to both prevent and better detect attackers in the future. When blue teams know which types of attacks to look for, and what they look like, they can detect and respond quicker, and as such, minimize the damage. The preparedness can help prevent and reduce the time required to identify a breach; supply chain included.

X-Force Red provides adversary simulation services to enterprises worldwide. The services include red teaming, purple teaming, threat-intel-based testing and control.

To learn more about the value each type of adversary simulation exercise can provide, download our new ebook, Adversary simulation: Put your incident response programs to the test.

More from Incident Response

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America. IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that…

Alert fatigue: A 911 cyber call center that never sleeps

4 min read - Imagine running a 911 call center where the switchboard is constantly lit up with incoming calls. The initial question, “What’s your emergency, please?” aims to funnel the event to the right responder for triage and assessment. Over the course of your shift, requests could range from soft-spoken “I’m having a heart attack” pleas to “Where’s my pizza?” freak-outs eating up important resources. Now add into the mix a volume of calls that burnout kicks in and important threats are missed.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today