‘Inception’ Attack: Enhanced Due Diligence Measures Essential

In March, 3CX disclosed a supply chain attack that surprised researchers investigating it. They discovered that the attack had an unusual and alarming origin: another company’s supply chain attack. This revelation in the “Inception” attack has caused concern among information security professionals. 
 
It has highlighted the unsettling reality that the security of their software may be far beyond their control, even when they follow best practices. In a world with extensive interdependencies, the implications of such attacks are troubling. They can spread like a virus, starting from one point and infecting connected communities. This raises concerns about the hidden presence of malicious actors deeply embedded in one’s environment. 
Why such attacks are concerning? 
What made this attack particularly concerning was its origin, which was traced back to another company’s supply chain attack. It signifies that even when organizations take all the necessary precautions and follow security best practices, their software’s security may still be compromised due to factors beyond their control. 
Such an attack has significant consequences, revealing the complex connections within the digital world. Software and systems depend on various parts from different vendors and suppliers. If any of these parts are c

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: