fortressinfosec.com
Open in
urlscan Pro
54.82.6.133
Public Scan
Submitted URL: https://d11dxp04.na1.hubspotlinks.com/Btc/2M+113/d11DXp04/VVscd42gL9pgW2mq7FG8Txy6PVrHz2f4C7R6qN5QLhTp3lScmV1-WJV7CgzHSW6vkckF5FWdPPW4...
Effective URL: https://fortressinfosec.com/whitepapers/white-paper-patch-poisoning/?utm_medium=email&_hsmi=196208358&_hsenc=p2ANqtz-9BoBYDa...
Submission: On December 16 via api from IE — Scanned from DE
Effective URL: https://fortressinfosec.com/whitepapers/white-paper-patch-poisoning/?utm_medium=email&_hsmi=196208358&_hsenc=p2ANqtz-9BoBYDa...
Submission: On December 16 via api from IE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
THREAT ALERT: CVE-2021-44228 is a critical vulnerability resulting in Remote Code Execution (RCE). Read Fortress's response to the recent Log4j exploit. * Company Back AboutLeadershipContact * Careers * Sectors Back Sectors Fortress operates in critical sectors where threats to the connected asset ecosystem are the most critical. By Industry Energy Fortress helps protect critical infrastructure for North American power companies Government Solutions Securing the supply chain is essential to our national security Manufacturing/OEM The digital transformation and a large supply chain brings increased risk Oil & Gas Fortress' solutions help protect the complex ecosystem from catastrophic risks Healthcare Advances in healthcare are coming at lightning speed, and so are the risks * Solutions Back Solutions Browse this section to learn about all the ways in which we can work with you to bolster your critical infrastructure cybersecurity Portfolio of Solutions Fortress Platform Fortress Platform integrates with leading security platforms and procurement systems to provide industry-leading third-party risk management and asset risk management services. Asset to Vendor Network Join our sharing model to receive instant industry information and the latest in emerging requirements File Integrity Assurance Learn more about our proprietary software that provides supply chain integrity and identifies threats in application patches and updates Supply Chain Risk Management Our Supply Chain Risk Management services prevent security breaches and ensure regulatory compliance through end-to-end assessment services and continuous monitoring. Asset Vulnerability Management Our asset vulnerability management services begin with visibility and end with security – leaving you confident in the integrity of the technology that accesses your operations. * News & Events Back NewsEvents * Resources Back PodcastsArticles & Press ReleasesWhite Papers & ReportsBlog * Contact WHITE PAPER PATCH POISONING- SOFTWARE SUPPLY CHAIN ATTACK DETECTION AND PREVENTION View Paper ABSTRACT As the prevalence of software supply chain attacks has escalated, recently highlighted by the SolarWinds Orion and Kaseya attacks, fears of future incidents have gripped the industry. The purpose of this paper is to examine a larger sample of software supply chain attacks, in an attempt to gauge how they occur and can be detected using technical measures. In order to focus on the larger issue of technical deterrence, and to avoid disagreements on which threat actors are responsible, this paper is not focused on the topic of attribution. The techniques used to defend against these attacks are irrelevant to their source, beyond the use of geo-IP based active blocking, like that commonly employed by commercial firewalls and similar protection methods. Attribution is a valuable data point for defenders but is beyond the scope of this analysis. Furthermore, the behavior of the malware once it exploits the target is largely unimportant to this analysis, as the goal is to review likely indicators prior to installation into victim environments. INTRODUCTION A patch poisoning attack is a type of supply chain attack compromising a software product by introducing malicious code into a patch for that product. Many organizations are vulnerable to this type of attack as most software used today is complex, including third-party software components that may be largely unknown to the software publisher. All software, including third-party software, requires frequent communication with the software supplier to provide updates and fix known vulnerabilities. This method of attack exploits the inherent trust between software suppliers and any consumers of that software, including end-users, internal development, and other software vendors. 189 S. Orange Ave, Ste 1950, Orlando, FL 32801 (407) 573-6800 sales@fortressinfosec.com © 2021, Fortress Information Security. All rights reserved. Privacy Policy This website uses cookies to improve your experience. By clicking "Accept", you agree to this as outlined in our Privacy Policy. To change your preferences, or opt out, please update your browser's cookie preferences. Accept