{"id":324,"date":"2021-04-01T22:50:00","date_gmt":"2021-04-01T22:50:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=324"},"modified":"2024-08-02T15:20:15","modified_gmt":"2024-08-02T22:20:15","slug":"accellion-supply-chain-attack","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/","title":{"rendered":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone"},"content":{"rendered":"\n<p>You know that game we played as children where we stood in a line and whispered a phrase to the next kid in line, and then they whispered it to the next kid, and so on, and so on down the line? Every time we played, the phrase changed as it went along, and by the end only the kid who started the game knew what the original phrase really was.<\/p>\n\n\n\n<p>I believe that the world&#8217;s worst game of telephone is playing out now with the recent spike in supply chain attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Was Affected and How<\/h2>\n\n\n\n<p>You have undoubtedly heard plenty about the\u00a0<a href=\"https:\/\/apnews.com\/press-release\/globe-newswire\/technology-technology-issues-computer-and-data-security-computer-networking-technology-hacking-8c08f8374493331403c1d3f9fe6dd2ad\">Accellion FTA-related<\/a>\u00a0breach(es) and how they affected Accellion customers, and even their customers\u2019 customers. (You probably took a break from\u00a0<a href=\"\/blog\/what-the-microsoft-exchange-zero-days-tell-us-about-the-attack-surface\/\">patching Microsoft Exchange<\/a>\u00a0or doing\u00a0<a href=\"\/blog\/how-to-improve-security-posture\/\">cleanup from the SolarWinds hack<\/a>\u00a0to look at Accellion-related disclosures and write-ups.) The reason I call it the worst game of telephone is because when I was researching Accellion I found that more than a month later there are still bits of information trickling out about who was affected and how. Like the game, the story seems to be changing as it progresses, and no one has the full details anymore.\u00a0<\/p>\n\n\n\n<p>This, on top of other recent supply chain hacks, led me to think about the importance of communication when these breaches happen: What good looks like. And what it doesn\u2019t. With the Accellion breach(es), I found that not all disclosures were public or full or timely, and some weren\u2019t any of those things. Let\u2019s take a look why that\u2019s a bigger problem than this one supply chain attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Accellion Disclosures<\/h2>\n\n\n\n<p>I\u2019ll be frank. On the whole, I found that Accellion\u2019s disclosures left a lot of room for improvement. Hopefully, showcasing this will provide all of us in the security business with an opportunity to learn, grow, and be better next time. Now, let me walk you through the timeline of their communications.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Jan 12: \u201cLess than 50 customers affected\u201d<\/h5>\n\n\n\n<p>On January 12th Accellion&nbsp;<a href=\"https:\/\/www.accellion.com\/company\/press-releases\/accellion-responds-to-recent-fta-security-incident\/\">disclosed<\/a>: \u201cIn mid-December, Accellion was made aware of a P0 vulnerability in its legacy File Transfer Appliance (FTA) software. Accellion FTA is a 20-year-old product that specializes in large file transfers. Accellion resolved the vulnerability and released a patch within 72 hours to the less than 50 customers affected.\u201d Keep that \u201cless than 50 customers affected\u201d in mind as we find out how many customers were actually affected and why telephone is an awful game in cybersecurity unless it is to highlight how small misconceptions can make huge differences!<\/p>\n\n\n\n<p>Another possible area of vagueness and ambiguity in that disclosure could be the use of \u201cP0 vulnerability.\u201d What exactly is a P0 vulnerability? If you Google that you won\u2019t get a direct hit (I tried).&nbsp; But if you dig a little deeper into&nbsp;<a href=\"https:\/\/developers.google.com\/issue-tracker\/concepts\/issues#:~:text=P0\">Google<\/a>&nbsp;you\u2019ll find P0 is for \u201can issue that needs to be addressed immediately and with as many resources as is required. Such an issue causes a full outage or makes a critical function of the product to be unavailable for everyone, without any known workaround.\u201d Which is confusing because far from creating a full outage, the vulnerabilities exploited here led to&nbsp;<strong>a lot<\/strong>&nbsp;of really sensitive data being dumped.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"739\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\" alt=\"Content Image\" class=\"wp-image-328\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png 1600w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41-512x236.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41-1280x591.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41-768x355.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41-1536x709.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n\n\n\n<p>Figure 1. Screen Capture from the Glossary for Google Issue Tracker.<\/p>\n\n\n\n<p>The reality of the situation now, several weeks after the initial disclosure by Accellion, is that worldwide, multiple malicious actors have attacked multiple international government entities; federal, state, and local government organizations; as well as private industry organizations in the information technologies, healthcare, education, legal, retail, transportation, telecommunications, finance, and energy sectors (among others). In most cases attackers have been looking to extort money from these organizations to prevent the posting of personally identifiable information of the victim\u2019s customers. So\u2026 in this game of telephone, the \u201cless than 50 customers affected\u201d blooms substantially when you start looking at the supply chain of disclosures which is what this article intends to do.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Feb 22: \u201cfewer than 100 were victims of the attack\u201d&nbsp;<\/h5>\n\n\n\n<p>On&nbsp;<a href=\"https:\/\/www.accellion.com\/company\/press-releases\/accellion-provides-update-to-fta-security-incident-following-mandiants-preliminary-findings\/\">February 22nd Accellion finally admitted<\/a>&nbsp;that out of approximately 300 FTA clients about 100 were victims of the attack and fewer than 25 appeared to have suffered major data thefts. Which made me wonder: who all got hit? And how bad was it for their customers and their customers\u2019 data? It also got me thinking about how these supply chain breaches work at an operational level. How do you re-establish trust? How do you get ahead of these things and communicate with your customers and their customers? Because despite the business world\u2019s increasing digital transformation and IT sophistication, supply chain attack response looks a lot like that old-fashioned game of telephone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who\u2019s Who of Responders<\/h2>\n\n\n\n<p>Now that we\u2019ve evaluated the first links in the chain, let\u2019s evaluate the list of fewer than 25 customers who were hosting sensitive data on Accellion FTA. Again, the goal here is to provide us all with a learning experience to hopefully improve disclosures in the future. In this case, I have split the customers into two categories, those who&nbsp;<strong>publicly<\/strong>&nbsp;disclosed, and those who did not. Of those that did not, they no doubt reached out to their individual affected customers, or had none that were affected. With the ones that made a public disclosure it\u2019s easy enough to read them and assess the degree to which they tell you what happened, when, and what impact it may have on their customers. Also, like an apology, I think it\u2019s critical that public disclosures also make amends. How is the company going to regain public trust?<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Public Disclosures:<\/h5>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/asic.gov.au\/about-asic\/news-centre\/news-items\/accellion-cyber-incident\/\">Australian Securities and Investments Commission (ASIC)<\/a>&nbsp;provided a complete breach disclosure with details about when and what was done. And currently they don\u2019t have evidence that credit license application data was actually stolen so further actions aside from contacting ASIC with concerns via e-mail are not required.<\/li>\n\n\n\n<li><a href=\"https:\/\/bombardier.com\/en\/media\/news\/bombardier-statement-cybersecurity-breach\">Bombardier<\/a>, a Canadian aviation company, reported on Feb. 23 that it recently suffered a &#8220;limited cybersecurity breach\u201d where approximately 130 employees located in Costa Rica were impacted.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.flagstar.com\/customer-support\/accellion-information-center.html\">Flagstaff Bank<\/a>, with assets of $31.0 billion, is the sixth largest bank mortgage originator and the second largest savings bank in the U.S. and maintains an \u201cAccellion Incident Information Center\u201d where their customers can get credit monitoring, fraud protection, and identity theft restoration.<\/li>\n\n\n\n<li>Fugro &#8211; Dutch-based multinational marine geo-data specialist disclosed about the breach in early February but provided few details about their \u201cCYBER SECURITY INCIDENT THIRD-PARTY SUPPLIER OF FUGRO\u201d. In summary, they don\u2019t believe any of their customers\u2019 data was stolen and are being quiet about any of their intellectual property.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.kroger.com\/i\/accellion-incident\">Kroger<\/a>, the United States&#8217; largest&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Supermarket\">supermarket<\/a>&nbsp;by revenue and the second-largest general retailer behind Walmart, has a webpage dedicated to the \u201cAccellion Incident\u201d along with a useful FAQ on who was impacted, what they knew and when, how they handled this, and really every detail that is part of responsible breach disclosure. They should be commended. It should be noted that by industry estimates \u2153 of Americans shop at Kroger\u2019s which is 209,128,094 adults and apparently 2% of those were affected by this breach or ~1.4M people\u2019s data.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.qimrberghofer.edu.au\/media-releases\/qimr-berghofer-investigates-suspected-accellion-data-breach\/\">QIMR Berghofer Medical Research Institute<\/a>, an Australian medical research institute, seems to be one of the few victims of this whose own data was compromised, like Fugro. In this case some of the documents in the Accellion FTA included de-identified information such as the initials, date of birth, age, gender, and ethnic group of clinical trial participants, as well as the participant codes. Some other documents include participants\u2019 de-identified medical histories, along with their codes. In their breach disclosure they admit that the data stored on the FTA while requiring 15-year storage didn\u2019t need to be accessible from the Internet.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.rbnz.govt.nz\/our-response-to-data-breach\">Reserve Bank of New Zealand<\/a>&nbsp;in their website, \u201cOur response to Data Breach,\u201d updated on March 16th, 2021, has been very transparent about the extent of the breach, timelines, and actions taken.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.singtel.com\/personal\/support\/about-accellion-security-incident\">Singapore Telecommunications<\/a>&nbsp;(<a href=\"https:\/\/www.singtel.com\/content\/dam\/singtel\/investorRelations\/stockExchange\/2021\/MS-20210211-Accellion.pdf\">Singtel<\/a>) provides a website updated on March 12th, 2021 with details \u201cABOUT ACCELLION FTA SECURITY INCIDENT.\u201d&nbsp;&nbsp;<a href=\"https:\/\/www.channelasia.tech\/article\/686365\/129-000-singtel-customers-info-stolen-after-accellion-hack\/\">Some reporting<\/a>&nbsp;holds that approximately 129,000 customers were affected by the breach.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.siumed.org\/mc\/news\/notification-potential-data-security-incident.html\">Southern Illinois University School of Medicine<\/a>&nbsp;maintains a disclosure statement \u201cNotification of a Potential Data Security Incident\u201d as of March 3rd and SIU determined that the documents taken contained personal information for certain individuals, including, their name, date of birth, Social Security number, driver\u2019s license number, medical treatment information, and medical insurance information.<\/li>\n\n\n\n<li>State of Washington also did a rapid response with a web page, \u201cAbout the Accellion Data Breach,\u201d affecting ~1.4M residents who filed for unemployment benefits with the state between January 1 to December 10, 2020. The disclosure includes details for getting free credit monitoring for fraud protection and a detailed timeline of the incident and the handling of it.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.transport.nsw.gov.au\/news-and-events\/articles\/transport-for-nsw-impacted-by-worldwide-accellion-data-breach\">Transport for New South Wales<\/a>&nbsp;disclosed on February 23rd and manages more than A$106 billion in property, plant and equipment assets for transportation in Australia\u2019s state of New South Wales.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.trilliumohp.com\/newsroom\/trillium-vendor-reports-a-data-security-incident.html\">Trillium<\/a>&nbsp;Community Health Plan on January 25th disclosed details about the breach and about actions it has taken and its customers can take. The compromised data included contact information, insurance ID numbers, dates of birth, and health information, such as medical conditions and treatments.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cu.edu\/accellion-cyberattack\">University of Colorado<\/a>&nbsp;disclosed in late January that personally identifiable information from students, employees and others may have been compromised.<\/li>\n\n\n\n<li><a href=\"https:\/\/blog.qualys.com\/vulnerabilities-research\/2021\/03\/11\/qualys-update-on-accellion-fta-security-incident\">Qualys<\/a>&nbsp;updated their blog on March 11th about the breach and stated that they believe they have a complete list of customers that had files on the Accellion FTA server at the time of the incident and that if you are a customer of theirs and haven\u2019t heard from them, that you are not affected. At this point it\u2019s not clear how many of their customers were affected.<\/li>\n<\/ol>\n\n\n\n<h5 class=\"wp-block-heading\">Non-Disclosure Approach<\/h5>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The American Bureau of Shipping or ABS Group, a technical services company, received an email from the CLOP ransomware group requesting ransom and appear to be facing potential lawsuits but have provided no disclosure as of March 18. It is possible that no data was actually exfiltrated.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1326\" height=\"776\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-39.png\" alt=\"Content Image\" class=\"wp-image-326\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-39.png 1326w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-39-512x300.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-39-1280x749.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-39-768x449.png 768w\" sizes=\"auto, (max-width: 1326px) 100vw, 1326px\" \/><\/figure>\n\n\n\n<p>Figure 2. Screen capture of ABS Groups site with search for Accellion<\/p>\n\n\n\n<p><a href=\"https:\/\/healthitsecurity.com\/news\/cisa-warns-of-accellion-fta-exploit-centene-among-breach-victims\">Centene<\/a>, a U.S. managed care provider ranked No. 42 in U.S. corporations by total revenue, has provided no public disclosure as of March 18th but is&nbsp;<a href=\"https:\/\/news.bloomberglaw.com\/tech-and-telecom-law\/centene-sues-accellion-over-personal-health-data-exposed-in-hack\">suing Accellion<\/a>&nbsp;over the vulnerabilities and hack. It should be noted that&nbsp;<a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/index.html\">HIPAA Breach Notification Rule, 45 CFR \u00a7\u00a7 164.400-414<\/a>, requires HIPAA-covered entities and their business associates to provide notification following a breach of unsecured protected health information. This rule applies to individual notification but also requires media notification within 90 days if the breach involves more than 500 citizens. As of the date of my research, we are still within 90 days.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.freightwaves.com\/news\/csx-probes-security-incident-as-hackers-leak-data\">CSX<\/a>&nbsp;is one of largest rail operators in the U.S., with its network primarily concentrated on the East Coast. The company generated $2.8 billion in net profits on $10.6 billion in revenue in 2020. As of March 18th it has not publicly disclosed details about the breach.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.law.com\/americanlawyer\/2021\/02\/02\/goodwin-points-to-third-party-vendor-as-root-of-data-breach\/\">Goodwin Law<\/a>&nbsp;was notified in late January by Accellion as to the vulnerabilities in their FTA and while not making any public disclosure, Goodwin privately contacted their clients about the issue according to an internal memo. The memo said Goodwin has alerted any clients that could have potentially been affected, as well as reached out to all clients to let them know what happened.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.justice4you.com\/blog\/accellion-data-breach.html\">Harvard Business School<\/a>&nbsp;has made no public disclosure as of March 18th but still maintains an Accellion FTA based on Kiteworks, the latest secure OS from Accellion.&nbsp; Again, it\u2019s possible nothing was stolen.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"782\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-40.png\" alt=\"Content Image\" class=\"wp-image-327\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-40.png 946w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-40-512x423.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-40-768x635.png 768w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><\/figure>\n\n\n\n<p>Figure 3. Screen capture from the Harvard site showing Accellion FTA<a href=\"https:\/\/www.wsj.com\/articles\/hacker-claims-to-have-stolen-files-belonging-to-prominent-law-firm-jones-day-11613514532\"><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.wsj.com\/articles\/hacker-claims-to-have-stolen-files-belonging-to-prominent-law-firm-jones-day-11613514532\">4.&nbsp;Jones Day<\/a>, the fifth largest law firm in the U.S., the 13th highest grossing law firm in the world, and outside counsel for Donald Trump&#8217;s 2016 and 2020 campaigns, was apparently a victim of the attack but did not publicly disclose what or if they were affected. The truly interesting thing here is that the company was&nbsp;<a href=\"https:\/\/www.law.com\/americanlawyer\/2021\/02\/24\/jones-day-removed-from-clop-target-list\/\">no longer listed on CLOP\u2019s site<\/a>&nbsp;for data drops which may mean they paid the ransom?<\/p>\n\n\n\n<p>With that, you can see for yourself a broad set of diverse responses to the Accellion breach(es). There are some good communications in the list above that we can all learn from. But with respect to Accellion, I find this a case study in what not to do with disclosure communications. Because detailing what \u201cbad\u201d looks like is only one, rather negative, part of the story and the really important, interesting piece is what you&nbsp;<em>should do,<\/em>&nbsp;I intend to publish a follow-up blog in the coming weeks with my take on how to achieve good disclosure communication.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[106,6,105,49],"class_list":["post-324","post","type-post","status-publish","format-standard","hentry","category-research","tag-accellion","tag-attack-surface-management","tag-cloud-security","tag-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-01T22:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T22:20:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\" \/>\n<meta name=\"author\" content=\"Jim Wachhaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Wachhaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\"},\"author\":{\"name\":\"Jim Wachhaus\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\"},\"headline\":\"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone\",\"datePublished\":\"2021-04-01T22:50:00+00:00\",\"dateModified\":\"2024-08-02T22:20:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\"},\"wordCount\":2155,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\",\"keywords\":[\"Accellion\",\"Attack Surface Management\",\"Cloud Security\",\"Vulnerability Management\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\",\"name\":\"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\",\"datePublished\":\"2021-04-01T22:50:00+00:00\",\"dateModified\":\"2024-08-02T22:20:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png\",\"width\":1600,\"height\":739},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\",\"name\":\"Jim Wachhaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"caption\":\"Jim Wachhaus\"},\"description\":\"Was Director of Technical Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/","og_locale":"en_US","og_type":"article","og_title":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog","og_description":"With the Accellion breach not all disclosures were public or full or timely. Learn why this is a bigger problem than this one supply chain attack.","og_url":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/","og_site_name":"CyCognito Blog","article_published_time":"2021-04-01T22:50:00+00:00","article_modified_time":"2024-08-02T22:20:15+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png","type":"","width":"","height":""}],"author":"Jim Wachhaus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Wachhaus","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/"},"author":{"name":"Jim Wachhaus","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0"},"headline":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone","datePublished":"2021-04-01T22:50:00+00:00","dateModified":"2024-08-02T22:20:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/"},"wordCount":2155,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png","keywords":["Accellion","Attack Surface Management","Cloud Security","Vulnerability Management"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/","url":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/","name":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png","datePublished":"2021-04-01T22:50:00+00:00","dateModified":"2024-08-02T22:20:15+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-41.png","width":1600,"height":739},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/accellion-supply-chain-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why On-Going Supply Chain Attacks Set Up an Awful Game of Telephone"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0","name":"Jim Wachhaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","caption":"Jim Wachhaus"},"description":"Was Director of Technical Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":5,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/324\/revisions"}],"predecessor-version":[{"id":1061,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/324\/revisions\/1061"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}