Last year witnessed an unprecedented increase in software supply chain attacks. According to Aqua Security’s annual supply chain study published in January, this method of cybercrime rose 300% in 2021 over 2020. At the same time, attacks are not just increasing in frequency. They’re also becoming costlier, with the average intrusion into an enterprise’s suppliers and partners now racking up $1.4 million in losses.
One growing concern amongst security experts is that supply chain attacks are destined to escalate from current levels. The seeming inevitability of things getting worse before they get better stems from two attention-grabbing observations.
In the first case, experts point to a few common culprits in supply chain exploits.
System-level visibility and early detection are essential to preventing successful supply chain attacks. In today’s increasing patchwork and ephemeral environments of cloud-based third-party servers and services, real-time visibility and monitoring across suppliers have become virtually impossible to sustain with the in-house Linux capabilities most SOC budgets can afford.
Spyderbat takes an industry-first proactive approach to this problem. Rather than retroactively responding to on alerts, where previous actions becoming increasingly difficult to identify, – Spyderbat proactively records all interactions between applications and the processor with their causal relationships, prior to any threat detection. Spyderbat weaves together the totality of these activities in Behavioral Web. Using the Behavioral Web, analysts find an up-to-date, detailed trace capturing every third-party action, software upgrade, and privilege escalation across the whole of your Linux environment.
Operating from this illuminated vantage point, analysts working with Spyderbat immediately recognize emerging attacks, including third-party actions.These capabilities extend to attacks spanning months of activity, even if across ephemeral systems and independently of potentially disabled logging systems.
Take the following example of a threat actor poising a software vendor.
Your existing security controls, such as SIEM and EDR, may pick up on one of the individual tactics and shut it down - but miss the source allowing the threat actor to try again. Spyderbat sees the totality of actions, all connected based on their causal connections, enabling early identification and complete mitigation.
Here is how the the same scenario looks in Spyderbat:
The Spyderbat advantage decimates dwell time and time between detection to root cause identification, allowing analysts to focus on real attacks and instill more exhaustive prevantive measures increasing the security posture of the organization.
To experience a personalized demo of Spyderbat’s full capabilities, contact us.