Attacks & Threats
Supply Chain Attack
Also known as: Third-party attack, Vendor compromise
Definition
An attack that compromises a trusted third-party software, hardware, or service provider in order to reach its downstream customers.
Examples
- Attackers inject a backdoor into a software vendor's signed update, infecting thousands of customers through routine patching.
- A malicious package is published to a public package registry with a name similar to a popular library.
Related terms
Advanced Persistent Threat (APT)
Advanced Persistent Threat (APT) — definition coming soon.
Watering Hole Attack
A targeted attack that compromises a website frequently visited by a specific group of users in order to infect them when they browse it.
Malware
Any software intentionally designed to disrupt, damage, or gain unauthorized access to computers, networks, or data.
Backdoor
A covert mechanism that bypasses normal authentication or access controls to give an attacker future entry to a system.
Typosquatting
Registering domain names or package names that are misspellings or visual look-alikes of legitimate ones, to catch users or developers who make typing or recognition errors.
Drive-by Download
An attack in which malware is silently installed on a victim's device simply by visiting a compromised or malicious website.