{"id":14024,"date":"2019-09-10T19:22:32","date_gmt":"2019-09-10T15:22:32","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/small-office-supply-chain\/14024\/"},"modified":"2019-11-15T15:21:57","modified_gmt":"2019-11-15T11:21:57","slug":"small-office-supply-chain","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/small-office-supply-chain\/14024\/","title":{"rendered":"Supply chain as SMB threat"},"content":{"rendered":"<p>Small business owners may think their companies are too insignificant to become a target for cybercriminals. There is a certain logic in that: Attackers look for maximum profit from minimum effort. But two additional points are important to consider. First, large companies spend solid budgets on defense and therefore are harder to attack. Second, another option may be more attractive \u2014 an attack through the supply chain. Malefactors can compromise one company and get to hundreds of small firms.<\/p>\n<h2>Attacks through the supply chain<\/h2>\n<p>Being attacked through a supply chain typically means that a service or program that you have used for some time has become malicious. Over the past few years, we have seen several similar incidents with varying degrees of complexity and destructiveness. Here are a couple of the loudest.<\/p>\n<h2>ExPetr ransomware outbreak<\/h2>\n<p>While focusing on the destructive consequences of <a href=\"https:\/\/www.kaspersky.com\/blog\/expetr-for-b2b\/17343\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ExPetr<\/a> (aka NotPetya), few people recall how it began. That\u2019s a shame: One of its distribution vectors practically defines \u201csupply-chain attack.\u201d Attackers compromised the automatic update system of accounting software called M.E.Doc, forcing it to deliver the ransomware to all customers. As a result, ExPetr caused millions in losses, infecting both large companies and small businesses.<\/p>\n<h2>The CCleaner incident<\/h2>\n<p>CCleaner is one of the most famous programs for system registry cleaning. It is widely used by both home users and system administrators. At some point, <a href=\"https:\/\/www.kaspersky.com\/blog\/ccleaner-supply-chain\/21785\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">attackers compromised the program developer\u2019s compilation environment<\/a>, equipping several versions with a backdoor. For a month these compromised versions were distributed from the company\u2019s official websites. It was downloaded 2.27 million times.<\/p>\n<h2>How to avoid becoming a victim<\/h2>\n<p>As you can see, in a supply-chain attack, cybercriminals do not have to choose you as a target. To some extent, you choose yourself, simply by using a particular service or program.<\/p>\n<p>The conclusion is clear (and it\u2019s not the most original one): Every single business device with Internet access must be protected. That includes computers, servers, mobile phones, and so on. Even if you are sure that you are not installing unknown programs on a computer, that\u2019s no guarantee malware won\u2019t come to you as an update of old and familiar software. In particular, computers should be protected by technologies that can counteract malicious miners and ransomware. These two attack methods are easiest to monetize, so attackers use them persistently.<\/p>\n<h2>How to protect small businesses<\/h2>\n<p>For small businesses, choosing a security solution is traditionally difficult. Products for home users lack the necessary capabilities, and solutions for large businesses are expensive and too complicated to manage without a dedicated IT Security department. So that small companies can protect their digital assets against modern cyberthreats, we have updated Kaspersky Small Office Security solution.<\/p>\n<p>Our solution is optimized for companies ranging in size from 5 to 25 employees, does not require any special skills for administration, and is capable of protecting almost every connected business device \u2014 personal computers, Windows file servers, and Android mobile devices.<\/p>\n<p>One of the main components of the solution, Kaspersky System Watcher, is equipped with behavioral analysis technologies that can identify ransomware and miners before they can do any harm to the user. In addition, Kaspersky Small Office Security protects online payments made with a browser, allows you to encrypt sensitive data, and makes backup copies of important information. You can find out more detailed information, buy a solution, or download a trial version on the <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security website<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Small businesses may not be the main target of cybercriminals, but it does not mean an SMB will not fall victim to a supply-chain attack. How not to become collateral damage.<\/p>\n","protected":false},"author":40,"featured_media":14025,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[234,1758],"class_list":{"0":"post-14024","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-small-business","10":"tag-supply-chain"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/small-office-supply-chain\/14024\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/small-office-supply-chain\/16632\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/small-office-supply-chain\/18598\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/small-office-supply-chain\/16670\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/small-office-supply-chain\/19273\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/small-office-supply-chain\/17992\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/small-office-supply-chain\/23649\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/small-office-supply-chain\/6454\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/small-office-supply-chain\/28592\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/small-office-supply-chain\/12284\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/small-office-supply-chain\/12325\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/small-office-supply-chain\/11247\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/small-office-supply-chain\/20165\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/small-office-supply-chain\/24122\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/small-office-supply-chain\/24288\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/small-office-supply-chain\/19116\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/small-office-supply-chain\/23354\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/small-office-supply-chain\/23264\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/small-business\/","name":"small business"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14024"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14024\/revisions"}],"predecessor-version":[{"id":14355,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14024\/revisions\/14355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/14025"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}