Skip Navigation
BlackBerry Blog

Supply Chain Lessons from Thousands of Exploding Pagers

When thousands of pagers exploded and killed or injured Hezbollah operatives in the Middle East, online speculation and debate ran wild. At first, many speculated it was some sort of cyberattack that caused the pager batteries to blow up in dramatic fashion. This led some to ask, “Could this happen in an attack against our phones?” 

But the conversation soon shifted to another possible scenario: the pagers must have been intercepted along the supply chain so someone could place explosives inside each pager with a method of remotely triggering the blasts. Attackers have utilized similar attacks before, although not to this scale. 

While the debate and analysis continue over the cause, an attack like this is a pertinent reminder for every organization to ask (or re-ask) key questions about the vendors that make up their supply chain, both physical and virtual. And while there’s no doubt this attack had physical ramifications in the real world, it should lead to internal conversations around what matters most to many organizations: software supply chain security. 

In this blog post, we will explore some of the key takeaways from previous software supply chain attacks.

Lessons from Previous Software Supply Chain Attacks

In today's digital age, the security of software supply chains is a critical priority. Before we dive into lessons learned from previous attacks, it’s essential to understand what a software supply chain attack is. These attacks target the weakest links in the software development and delivery process, injecting malicious code or software updates at various points in the chain. The goal is often to compromise a widely used piece of software to gain access to numerous networks and systems downstream.

Lesson 1: Trust but Verify

One of the most critical lessons from recent attacks is the importance of verifying the integrity of third-party software and updates. The attack against SolarWinds, for instance, exploited the trust organizations had in the software company’s update mechanism. Businesses need to implement stringent verification processes to ensure the software they are integrating into their systems is free from malicious alterations. This includes source code audits, checksums, and digital signatures.

Lesson 2: Carefully Vet Your Vendors

Building strong relationships with vendors and suppliers is another critical lesson. Establishing security requirements and holding vendors accountable for their cybersecurity practices ensures that they meet your organization’s standards. Ask about certifications that validate their security commitments. Regularly updating and reviewing contracts and agreements can also fortify the partnership against potential risks. This includes language with a time commitment to respond in case a vulnerability is discovered. Another question to ask: do we have a trusted and certified communication source for when normal channels fail?  

Lesson 3: Enhance Visibility and Monitoring

Visibility into the software supply chain is crucial. Every organization should have and regularly update an SBOM (software bill of materials) so you can quickly determine risk in case a downstream vendor is breached. The visibility provided by an SBOM also improves continuous monitoring and real-time analytics to help detect anomalies and potential security breaches early on. AI-based cybersecurity tools and MDR (managed detection and response) can also help. In addition, consider an MDR service that allows you to bring your existing security stack because it will help you rapidly increase your security posture without ripping out what you already use. 

Lesson 4: Regularly Update and Patch Systems

Outdated and unpatched software remains one of the most common entry points for attackers. Organizations should establish a robust patch management process to ensure all systems are up-to-date with the latest security patches. Regular vulnerability assessments and penetration testing can also identify weak points that need immediate attention.

Lesson 5: Conduct Regular Training and Awareness Programs

Human error remains a significant factor in cybersecurity incidents. Providing regular training and awareness programs for employees can reduce the risk of falling victim to phishing attacks and other social engineering tactics. Ensuring that all personnel are aware of the latest threats and best practices in cybersecurity can create a more resilient and vigilant organizational culture.

Final Thoughts 

Regardless of the type of attack that unfolds, each incident provides us another opportunity to explore what happened and spot potential gaps at our own organization. 

When it comes to software supply chain threats, the frequency and sophistication of these attacks are expected to increase. However, by learning from past incidents and implementing comprehensive security measures, organizations can significantly reduce their vulnerability to such attacks.  

It’s important to remember that threat actors will pivot into new parts of the supply chain, which can rapidly increase your risk. And this is why focusing on supply chain security — in its entirety — is so crucial.  

For similar blogs and news delivered right to your inbox, please subscribe to the BlackBerry Blog.
Christine Gadsby

About Christine Gadsby

Christine Gadsby is Cybersecurity CISO at BlackBerry. Follow Christine on X @christinegadsby