On Dec. 13 last year, cybersecurity company FireEye broke news of the most widespread hacking attack on US government agencies in the country’s history. Government departments affected by the attack, which exploited a vulnerability in proprietary network management software made by the Texas-based software provider SolarWinds, included the US departments of energy, treasury, homeland security, justice and defense.
The SolarWinds incident highlights the severe impact that “software supply chain” attacks can have. Hackers first analyze the software used by the target organization, then identify downstream suppliers to these software products with relatively weak data security practices and infect their software update infrastructure with malicious code. Once the organization updates the software, the malicious code is downloaded onto its systems.
Taiwan is no stranger to software supply chain hacking attacks. From June to November 2018, a software update server operated by Asustek Computer fell victim to a hacker who used a hidden malicious code to infect a new version of software distributed to tens of thousands of Asus laptops, even though the software update carried a valid digital signature.
After receiving information from the Criminal Investigation Bureau, the National Communications Commission on Jan. 6 ordered Taiwan Mobile to recall all 94,000 units of its self-branded, China-made Amazing A32 smartphones after their built-in software was found to contain a malicious program.
An investigation by the bureau found that a malicious program had been embedded into the smartphones’ firmware memory prior to leaving the factory. This means that even if a user restarts or resets their phone, the malicious program would not be removed.
After issuing a recall, Taiwan Mobile carried out an audit of all of its Amazing brand smartphones, and established that only the Amazing A32 is subcontracted to a Chinese manufacturer and the other models do not have the same data security flaw.
Analyses of past instances of software supply chain hacking attacks show that they can basically be classified into four types of attacks.
The first is where the supplier company is itself the attacker.
For example, a bad actor could spend US$100 million to purchase a software company that has tens of thousands of enterprise clients, then use the company’s software product(s) to deliver Trojan horse malicious code. This is a much cheaper and more effective way to infect machines than going to the trouble of developing an online attack that has to infect each target organization one by one.
The second is to hack the software supply company and bury malicious code within its software. This is how the SolarWinds attack was carried out.
The third is when a software supplier uses third-party software in their product that contains malicious code, such as open source software.
The fourth involves a software supplier using third-party software that contains flawed code that can be exploited by hackers. Since contemporary software design makes use of a large number of open source software packages, malicious actors have a relatively large number of opportunities to embed malicious code within frequently used software programs.
The Clean Network program, proposed by the US Department of State in April last year, asks participating telecoms not to use electronic equipment that contains China-made software, such as Huawei Technologies products. This type of policy is designed to pre-empt and prevent the first category of supply chain attack.
In addition to strengthening its own data security protections, Taiwan Semiconductor Manufacturing Co is asking its suppliers to establish basic data security standards, and incorporate these into their routine inspections and audits.
The idea is that if each manufacturer within the industrial ecosystem establishes appropriate data security self-defense, this should help to prevent the second class of supply chain attack.
To resist the third and fourth types of attack requires the manufacturer of each piece of software-containing equipment and device to establish a software bill of materials (SBOM). An SBOM should clearly list all of the open source software packages used within its software, known flaws within each of the packages, the main developer of the software, and the company or organization to which they are affiliated.
Since many of Taiwan’s computer and network communications equipment firms will be expected to provide an SBOM in the future, establishing a database of open source software that conforms to traceability requirements and can continuously track software updates, which can be shared by manufacturers, would greatly reduce the cost of compiling SBOMs for Taiwan’s domestic industries.
Additionally, to more effectively deal with the last two types of supply chain attacks, it would be necessary to develop software analysis tools that can scan the source code of open source software and identify potential malicious software and other vulnerabilities. Unfortunately, such tools are not yet fully mature, and require further research and development.
Chiueh Tzi-cker is general director of Information and Communication Labs at the Industrial Technology Research Institute.
Translated by Edward Jones
US President Donald Trump has gotten off to a head-spinning start in his foreign policy. He has pressured Denmark to cede Greenland to the United States, threatened to take over the Panama Canal, urged Canada to become the 51st US state, unilaterally renamed the Gulf of Mexico to “the Gulf of America” and announced plans for the United States to annex and administer Gaza. He has imposed and then suspended 25 percent tariffs on Canada and Mexico for their roles in the flow of fentanyl into the United States, while at the same time increasing tariffs on China by 10
As an American living in Taiwan, I have to confess how impressed I have been over the years by the Chinese Communist Party’s wholehearted embrace of high-speed rail and electric vehicles, and this at a time when my own democratic country has chosen a leader openly committed to doing everything in his power to put obstacles in the way of sustainable energy across the board — and democracy to boot. It really does make me wonder: “Are those of us right who hold that democracy is the right way to go?” Has Taiwan made the wrong choice? Many in China obviously
US President Donald Trump last week announced plans to impose reciprocal tariffs on eight countries. As Taiwan, a key hub for semiconductor manufacturing, is among them, the policy would significantly affect the country. In response, Minister of Economic Affairs J.W. Kuo (郭智輝) dispatched two officials to the US for negotiations, and Taiwan Semiconductor Manufacturing Co’s (TSMC) board of directors convened its first-ever meeting in the US. Those developments highlight how the US’ unstable trade policies are posing a growing threat to Taiwan. Can the US truly gain an advantage in chip manufacturing by reversing trade liberalization? Is it realistic to
About 6.1 million couples tied the knot last year, down from 7.28 million in 2023 — a drop of more than 20 percent, data from the Chinese Ministry of Civil Affairs showed. That is more serious than the precipitous drop of 12.2 percent in 2020, the first year of the COVID-19 pandemic. As the saying goes, a single leaf reveals an entire autumn. The decline in marriages reveals problems in China’s economic development, painting a dismal picture of the nation’s future. A giant question mark hangs over economic data that Beijing releases due to a lack of clarity, freedom of the press