ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์€ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์ผ๊นŒ?

2024. 9. 30. 10:05ยท๋ณด์•ˆ ์ด์Šˆ

๐Ÿ“ฐ ๋ธ”๋กœ๊ทธ ๋งํฌ

https://blog.talosintelligence.com/threat-source-newsletter-sept-26-2024/

 

Are hardware supply chain attacks “cyber attacks?”

It shouldn’t just be viewed as a cybersecurity issue, because for a hardware supply chain attack, an adversary would likely need to physically infiltrate or tamper with the manufacturing process.

blog.talosintelligence.com

 

 

๐Ÿ“ ์š”์•ฝ [TL;DR]

  • ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์€ ๋‹จ์ˆœํžˆ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์˜ ์˜์—ญ์„ ๋„˜์–ด์„œ ๋ฌผ๋ฆฌ์  ์นจ์ž…๊ณผ ์ œ์กฐ ๊ณต์ •, ๋ฌผ๋ฅ˜ ๋ณด์•ˆ ๋“ฑ์˜ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์™€ ์—ฐ๊ด€๋˜์–ด ์žˆ์Œ
  • ์ด๋Ÿฌํ•œ ๊ณต๊ฒฉ์€ ๋ฌผ๋ฆฌ์  ์ œ์กฐ ๊ณต์ •์„ ์•…์šฉํ•ด ๋ณด์•ˆ ๊ฒฐํ•จ์„ ๋งŒ๋“ค๊ฑฐ๋‚˜, ์žฅ์น˜๋ฅผ ๋ณด๊ด€ํ•˜๋Š” ๋ฌผ๋ฅ˜ ๋‹จ๊ณ„์—์„œ ์žฅ์น˜๊ฐ€ ๋ณ€์กฐ๋  ์ˆ˜ ์žˆ๋Š” ์œ„ํ—˜์ด ์กด์žฌํ•จ
  • ์ด๋Š” ํ•˜๋“œ์›จ์–ด ์ž์ฒด์— ๋ณด์•ˆ ๊ฒฐํ•จ์ด๋‚˜ ๋ฐฑ๋„์–ด๋ฅผ ์‹ฌ์–ด๋‘๋Š” ๋ฐฉ์‹์ด๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ์Œ
  • ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์˜ ํ•ด๊ฒฐ์„ ์œ„ํ•ด์„œ๋Š” ์ œ์กฐ, ๋ฌผ๋ฅ˜, ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ถ„์•ผ ๊ฐ„์˜ ํ˜‘๋ ฅ์ด ํ•„์ˆ˜์ ์ž„

 

๐Ÿ“ ์ฃผ์š” ๋‚ด์šฉ

ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์€ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ๋ฒ”์ฃผ์—๋งŒ ํ•œ์ •๋˜์ง€ ์•Š๋Š” ๋ณต์žกํ•œ ์œ„ํ˜‘์ด๋‹ค.

 

๊ธฐ์กด์˜ ์†Œํ”„ํŠธ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์€ ์ฃผ๋กœ ์†Œํ”„ํŠธ์›จ์–ด ์—…๋ฐ์ดํŠธ์— ์•…์„ฑ ์ฝ”๋“œ๋ฅผ ์ฃผ์ž…ํ•˜๋Š” ๋ฐฉ์‹์ด์ง€๋งŒ, ํ•˜๋“œ์›จ์–ด ๊ณต๊ฒฉ์€ ๋ฌผ๋ฆฌ์ ์ธ ์ œ์กฐ ๊ณต์ •์ด๋‚˜ ์žฅ์น˜์˜ ์œ ํ†ต ๊ณผ์ •์—์„œ ๋ณด์•ˆ ๊ฒฐํ•จ์ด๋‚˜ ๋ฐฑ๋„์–ด๋ฅผ ์‹ฌ์–ด๋‘ ์œผ๋กœ์จ ์ด๋ฃจ์–ด์ง„๋‹ค.

์˜ˆ๋ฅผ ๋“ค๋ฉด ํšŒ๋กœํŒ์— ์•…์„ฑ ๋งˆ์ดํฌ๋กœ์นฉ์„ ์‚ฝ์ž…ํ•˜๋Š” ๋ฐฉ์‹์ด ์žˆ๋‹ค.

 

ํ•˜์ง€๋งŒ ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์„ ๋ฐฉ์ง€ํ•˜๋Š” ๊ฒƒ์€ ์ œ์กฐ์—…์ฒด๋‚˜ ๋ณด์•ˆํŒ€๋งŒ์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋‹ค.

๋ฌผ๋ฅ˜ ๊ณผ์ •์—์„œ ์žฅ์น˜๊ฐ€ ๋ณ€์กฐ๋  ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋Šฅ์„ฑ๋„ ์žˆ์œผ๋ฉฐ, ์žฅ์น˜๊ฐ€ ๋ณด๊ด€๋˜๋Š” ์ฐฝ๊ณ ๋‚˜ ๋ฌผ๋ฅ˜ ํŠธ๋Ÿญ์—์„œ ๋ฌผ๋ฆฌ์ ์œผ๋กœ ์นจ์ž…ํ•  ๊ฐ€๋Šฅ์„ฑ๋„ ์กด์žฌํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

 

ํ•˜๋“œ์›จ์–ด ๊ณต๊ฒฉ์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ๋ฌผ๋ฆฌ์  ๋ฐฉ์–ด ์ฒด๊ณ„๋„ ์ค‘์š”ํ•˜๋‹ค.

์Šค๋งˆํŠธ ์ปจํ…Œ์ด๋„ˆ, ์‹ค์‹œ๊ฐ„ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ์Šคํ…œ, ์ž๋™ํ™”๋œ ๋ณด์•ˆ ๊ฒ€์‚ฌ ๋“ฑ ๋‹ค์–‘ํ•œ ๊ธฐ์ˆ ์ด ์กด์žฌํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ๊ธฐ์ˆ ๋“ค์€ ๋น„์šฉ์ด ๋งŽ์ด ๋“ค๊ธฐ ๋•Œ๋ฌธ์— ์˜ˆ์‚ฐ๊ณผ ์ธ๋ ฅ์ด ๋ถ€์กฑํ•œ ๋ณด์•ˆํŒ€์—๊ฒŒ๋Š” ํฐ ๋ถ€๋‹ด์ด ๋  ์ˆ˜ ์žˆ๋‹ค.

 

์ด์ฒ˜๋Ÿผ ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์„ ๋ฐฉ์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋ฌผ๋ฅ˜, ์ œ์กฐ, ๋ณด์•ˆ ๋ถ€๋ฌธ ๊ฐ„์˜ ๊ธด๋ฐ€ํ•œ ํ˜‘๋ ฅ์ด ํ•„์š”ํ•˜๋ฉฐ, ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ถ„์•ผ๋งŒ์œผ๋กœ๋Š” ํ•ด๊ฒฐํ•  ์ˆ˜ ์—†๋Š” ๋ฌธ์ œ์ด๋‹ค.

 

๊ฒฐ๊ตญ, ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์‚ฐ์—…์€ ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ ๋ฌธ์ œ ํ•ด๊ฒฐ์— ์ค‘์š”ํ•œ ์—ญํ• ์„ ๋งก๊ณ  ์žˆ์ง€๋งŒ, ์—ฌ๋Ÿฌ ๋ถ€๋ฌธ์ด ํ˜‘๋ ฅํ•ด์•ผ๋งŒ ์ด ๋ฌธ์ œ์— ํšจ๊ณผ์ ์œผ๋กœ ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ๋‹ค.

 

 


์ƒ๊ฐ ๊ธฐ๋ก...

์†Œํ”„ํŠธ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๋ฌธ์ œ๋Š” ์›Œ๋‚™ ์ž˜ ์•Œ๋ ค์ ธ ์žˆ์—ˆ์ง€๋งŒ ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์— ๋Œ€ํ•ด์„œ๋Š” ์ž˜ ์ƒ๊ฐ์„ ํ•ด๋ณด์ง€ ๋ชปํ–ˆ๋˜๊ฒƒ ๊ฐ™๋‹ค. ํ•˜๋“œ์›จ์–ด ์‹œ์ดˆ๋กœ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์ด ์–ผ๋งˆ๋“ ์ง€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ ๊ฐ™๋‹ค๋Š” ์ƒ๊ฐ์„ ํ•  ์ˆ˜ ์žˆ์—ˆ๋˜ ๊ธ€์ด๋‹ค...

์ €์ž‘์žํ‘œ์‹œ ๋น„์˜๋ฆฌ (์ƒˆ์ฐฝ์—ด๋ฆผ)

'๋ณด์•ˆ ์ด์Šˆ' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

AI ํ™˜๊ฐ์œผ๋กœ ์ธํ•œ ์ƒˆ๋กœ์šด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ: ์Šฌ๋กญ์Šค์ฟผํŒ…(Slopsquatting)  (0) 2025.04.14
์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„ ํฌ๋Ÿผ์— ์œ ์ถœ๋œ Amazon์˜ ์ง์› ์ •๋ณด  (2) 2024.11.13
SpyAgent: ์ด๋ฏธ์ง€ ์ธ์‹์„ ํ†ตํ•œ ์•”ํ˜ธ ํ™”ํ ์ž๊ฒฉ ์ฆ๋ช… ํƒˆ์ทจ ์•ˆ๋“œ๋กœ์ด๋“œ ์ŠคํŒŒ์ด์›จ์–ด  (0) 2024.09.09
๋ฐฑ์•…๊ด€, ์ธํ„ฐ๋„ท์˜ ์ทจ์•ฝํ•œ ์—ฐ๊ฒฐ๊ณ ๋ฆฌ BGP ๋ณด์•ˆ ๊ฐ•ํ™” ํ•„์š”์„ฑ ์ œ๊ธฐ  (6) 2024.09.04
Microsoft์˜ Graph API๋ฅผ ํ™œ์šฉํ•œ ์œ„ํ˜‘  (0) 2024.05.03
'๋ณด์•ˆ ์ด์Šˆ' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€
  • AI ํ™˜๊ฐ์œผ๋กœ ์ธํ•œ ์ƒˆ๋กœ์šด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ: ์Šฌ๋กญ์Šค์ฟผํŒ…(Slopsquatting)
  • ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„ ํฌ๋Ÿผ์— ์œ ์ถœ๋œ Amazon์˜ ์ง์› ์ •๋ณด
  • SpyAgent: ์ด๋ฏธ์ง€ ์ธ์‹์„ ํ†ตํ•œ ์•”ํ˜ธ ํ™”ํ ์ž๊ฒฉ ์ฆ๋ช… ํƒˆ์ทจ ์•ˆ๋“œ๋กœ์ด๋“œ ์ŠคํŒŒ์ด์›จ์–ด
  • ๋ฐฑ์•…๊ด€, ์ธํ„ฐ๋„ท์˜ ์ทจ์•ฝํ•œ ์—ฐ๊ฒฐ๊ณ ๋ฆฌ BGP ๋ณด์•ˆ ๊ฐ•ํ™” ํ•„์š”์„ฑ ์ œ๊ธฐ
602zzang
602zzang
  • 602zzang
    yks_STUDY
    602zzang
  • ์ „์ฒด
    ์˜ค๋Š˜
    ์–ด์ œ
    • ๋ถ„๋ฅ˜ ์ „์ฒด๋ณด๊ธฐ (77)
      • Programming Language (36)
        • C (15)
        • PYTHON (9)
        • RUST (12)
      • Reverse Engineering (3)
      • OS (17)
        • LINUX (17)
      • ๋ณด์•ˆ ์ด์Šˆ (6)
      • Digital Forensics (1)
      • CTF (8)
      • ๊ธฐํƒ€ (6)
  • ๋ธ”๋กœ๊ทธ ๋ฉ”๋‰ด

    • ํ™ˆ
    • ํƒœ๊ทธ
    • ๋ฐฉ๋ช…๋ก
  • ๋งํฌ

  • ๊ณต์ง€์‚ฌํ•ญ

  • ์ธ๊ธฐ ๊ธ€

  • ํƒœ๊ทธ

    ๋ฐฑ์ค€
    ๋ณด์•ˆ์ด์Šˆ
    ๊ณต๊ธ‰๋ง
    ์†Œ์ผ“ ํ†ต์‹ 
    P4C
    rustling
    ์ฝ”๋“œ์—…
    python
    umassctf2025
    cyberdefenders
    ๋“œ๋ฆผํ•ต
    ํŒŒ์ด์ฌ
    c
    TeamH4C
    picoCTF
    bandit
    Rocky Linux
    ๋ณด์•ˆ๋™ํ–ฅ
    rust
    ๋นก๊ณตํŒŸ
  • ์ตœ๊ทผ ๋Œ“๊ธ€

  • ์ตœ๊ทผ ๊ธ€

  • hELLOยท Designed By์ •์ƒ์šฐ.v4.10.0
602zzang
ํ•˜๋“œ์›จ์–ด ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์€ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์ผ๊นŒ?
์ƒ๋‹จ์œผ๋กœ

ํ‹ฐ์Šคํ† ๋ฆฌํˆด๋ฐ”