{"id":44640,"date":"2021-12-31T13:53:18","date_gmt":"2021-12-31T13:53:18","guid":{"rendered":"http:\/\/d56b4125-14bf-404f-8291-f3c39d6e49db"},"modified":"2021-12-31T13:53:18","modified_gmt":"2021-12-31T13:53:18","slug":"copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/","title":{"rendered":"Copycat and fad hackers will be the bane of supply chain security in 2022"},"content":{"rendered":"<p>Replicable attacks and a low barrier to entry will ensure the rate of supply chain attacks increases next year, cybersecurity researchers have warned.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\" readability=\"7.6650717703349\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<div class=\"thumb\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> <span class=\"img \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" class alt=\"Best security key 2021\" height=\"165\" width=\"220\"><\/span> <\/a> <\/div>\n<p class=\"title\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\"> Best security key 2021 <\/a> <\/p>\n<p class=\"dek\">While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.<\/p>\n<p class=\"read-more\"> <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a> <\/p>\n<\/p><\/div>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/us-and-eu-to-cooperate-on-tech-standards-supply-chain-security-and-tackling-non-market-practices\/\" target=\"_blank\" rel=\"noopener\">supply chain<\/a> is a consistent attack vector for threat actors today. By compromising a centralized service, platform, or software, attackers can then either conduct widespread infiltration of the customers and clients of the original &#8212; singular &#8212; victim or may choose to cherry-pick from the most valuable potential targets.&nbsp;<\/p>\n<p>This can save cybercriminals time and money, as one successful attack can open the door to potentially thousands of victims at once.&nbsp; <\/p>\n<p>A ransomware attack levied <a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noopener\">against Kaseya<\/a> in 2021 highlighted the disruption a supply chain-based attack can cause. Ransomware was deployed by exploiting a vulnerability in Kaseya&#8217;s VSA software, leading to the compromise of multiple managed service providers (MSP) in Kaseya&#8217;s customer base.&nbsp; <\/p>\n<p>However, it was only a small number of businesses that were impacted in this case. One of the most powerful examples in recent years is the <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-attack-hit-100-companies-and-took-months-of-planning-says-white-house\/\" target=\"_blank\" rel=\"noopener\">SolarWinds breach<\/a>, in which a malicious software update was deployed to roughly 18,000 clients.&nbsp; <\/p>\n<p>The attackers behind the intrusion then selected a handful of <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-hacking-group-nobelium-is-now-targeting-the-global-it-supply-chain-microsoft-warns\/\" target=\"_blank\" rel=\"noopener\">high-profile customers<\/a> to compromise further, including numerous US government agencies, Microsoft, and FireEye. &nbsp; <\/p>\n<p>In an analysis of 24 recent software supply chain attacks, including those experienced by Codecov, Kaseya, SolarWinds, and Mimecast, the European Union Agency for Cybersecurity (ENISA) said that the <a href=\"https:\/\/www.zdnet.com\/article\/supply-chain-attacks-are-getting-worse-and-you-are-not-ready-for-them\/\" target=\"_blank\" rel=\"noopener\">planning and execution<\/a> stage of supply chain attacks are usually complex &#8212; but the attack methods often chosen are not. <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/supply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger\/\" target=\"_blank\" rel=\"noopener\">Supply chain attacks<\/a> can be conducted through the exploitation of software vulnerabilities; malware, phishing, stolen certificates, compromised employee credentials &amp; accounts, vulnerable open source components, and firmware tampering, among other vectors.&nbsp;<\/p>\n<p>But what can we expect from supply chain security in 2022? <\/p>\n<h3><strong>Low barriers to entry<\/strong><\/h3>\n<p>Speaking to <em>ZDNet<\/em>, Ilkka Turunen, Field CTO of Sonatype, said that malicious software supply chain activity is likely to increase in 2022 due to low barrier to entry attack methods, such as dependency confusion &#8212; which is a &#8220;highly replicable&#8221; attack method.&nbsp; <\/p>\n<p>&#8220;It&#8217;s a no-brainer to use if the actor&#8217;s goal is to affect as many organizations as possible,&#8221; Turunen commented. &#8220;Add a cryptominer to a dependency confusion attack, and not only does a company need to worry about the effects this has on their software ecosystem, but the actor has now monetized it.&#8221; <\/p>\n<p>Brian Fox, the CTO of the enterprise software company, added that the majority of threat actors are copycats today, and &#8220;fad&#8221; attacks &#8212; or, the &#8216;attack of the day&#8217; conducted by fast-acting threat actors &#8212; are going to increase the number of supply chain intrusions next year.&nbsp;<\/p>\n<hr>\n<p><strong>Read on:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/blog\/amr-research\/\" target=\"_blank\" rel=\"noopener\">Technology and the Global Supply Chain<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/supply-chain-security-is-actually-worse-than-we-think\/\" target=\"_blank\" rel=\"noopener\">Supply chain security is actually worse than we think<\/a> |&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/91-of-it-leaders-affected-by-supply-chain-disruption-survey\/\" target=\"_blank\" rel=\"noopener\">91% of IT leaders affected by supply chain disruption: survey<\/a>&nbsp;|<\/p>\n<hr>\n<h3><strong>Increasing attacks while redefining the perimeter<\/strong><\/h3>\n<p>In a world of Internet of Things (IoT) devices, old security models, working from home stipulations, hybrid cloud\/on-prem setups, and complicated digital supply chains are no longer suitable. <\/p>\n<p>According to Sumo Logic&#8217;s CSO George Gerchow, enterprise players are &#8220;still struggling&#8221; with the concept of not having a defined defense perimeter. While also pressing ahead with digital transformation projects, they are failing to account for the expanded attack surface new apps and services can create. <\/p>\n<blockquote readability=\"11\">\n<p>&#8220;CISOs and IT security teams still don&#8217;t have a seat at the table, and security is still being bolted on as the last step in the process. In the next year, the leadership teams at organizations will start to wake up to this. Management boards are becoming more security conscious due to the hype around ransomware and extortion, which forces them to care about security problems.&#8221; <\/p>\n<\/blockquote>\n<p>Companies now increasingly reliant on components, platforms, and services provided at different levels of a supply chain will also have to wake up to this reality, and as a result, security will need to be checked &#8212; and reinforced &#8212; including outside of a businesses&#8217; own networks. <\/p>\n<h3><strong>Ransomware incidents will increase<\/strong><\/h3>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/hit-by-ransomware-make-sure-you-dont-make-this-first-obvious-mistake\/\" target=\"_blank\" rel=\"noopener\">Ransomware<\/a> is now one of the most lucrative aspects of the cybercriminal world, with high illicit payments made and due to the extortion tactics used, including permanent encryption and the threat of sensitive information being released.&nbsp; <\/p>\n<p>With a record blackmail payment made in 2021 of <a href=\"https:\/\/www.zdnet.com\/article\/us-insurance-giant-cna-financial-paid-40-million-ransom-to-wrestle-back-control-of-systems\/\" target=\"_blank\" rel=\"noopener\">$40 million<\/a>, ransomware will likely begin to make more of an appearance in supply chain attacks.&nbsp; <\/p>\n<p>However, these take planning, knowledge, and some skill &#8212; and so Splunk security strategist Ryan Kovar believes that cybercriminals on the road to becoming &#8220;professional&#8221; will likely be the ones to combine ransomware and supply chain attack vectors.&nbsp; <\/p>\n<p>&#8220;Through attacking the supply chain, attackers can hold an organization&#8217;s data for ransom, and research indicates that two-thirds of ransomware attacks are enacted by low-level grifters who bought ransomware tools off the Dark Web,&#8221; Kovar says. &#8220;With the ongoing supply chain crisis leaving supply lines more vulnerable than ever, organizations must prepare themselves for the inevitability of ransomware attacks to their supply chains.&#8221; <\/p>\n<h3><strong>Technical debt will have to be paid&nbsp;<\/strong><\/h3>\n<p>As enterprise organizations begin to analyze the digital supply chain for weak spots, they will also have to deal with their levels of &#8220;technical debt&#8221; &#8212; described by Stuart Taylor, Senior Director at Forcepoint X-Labs, as the difference between &#8220;the &#8216;price&#8217; a technical project should cost in order to be future-proofed and secure, and the &#8216;price&#8217; an organization is prepared to pay in reality.&#8221; <\/p>\n<p>Forcepoint expects to see a &#8220;significant&#8221; rise in copycat attacks against the supply chain next year, and so organizations are urged to conduct frequent code reviews and to keep security in mind during every step in the development and deployment process. Taylor commented:<\/p>\n<blockquote readability=\"10\">\n<p>&#8220;Software still in use can&#8217;t be left to languish, with updates and patching ignored. That couldn&#8217;t be an easier way in for attackers to gain a foothold. None of these are small undertakings in themselves but compared to the destruction that software supply chain malware can cause, it&#8217;s something no organization can afford to ignore.&#8221; <\/p>\n<\/blockquote>\n<h3><strong>SBOMs<\/strong><\/h3>\n<p>The lack of transparency surrounding the components, software, and security posture of players within a supply chain also continues to be a problem for today&#8217;s vendors.&nbsp;<\/p>\n<p>In light of recent, debilitating attacks such <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-us-and-uk-blame-russian-intelligence-service-hackers-for-major-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">as Solarwinds<\/a>, Gary Robinson, CSO at Uleska, believes that over the next 12 months, more companies will require a security-orientated <a href=\"https:\/\/www.ntia.gov\/SBOM\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Bill of Materials<\/a> (SBOMs), potentially as part of due diligence in future supply chain business agreements.&nbsp; <\/p>\n<p>SBOMs are software and component inventories designed to enforce open transparency around software use in the enterprise. They may include supplier lists, licenses, and security auditing assurances.&nbsp; <\/p>\n<p>&#8220;Organizations will also move to Continual Security Assurance where suppliers will be required to provide up-to-date security reports,&#8221; Robinson predicts. &#8220;No longer will a security report from six months ago satisfy security concerns of an update delivered yesterday. This gap in security directly relates to the company&#8217;s own security assurance, and suppliers will need to catch up.&#8221;<\/p>\n<hr>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts explain why the supply chain is now a top target for cybercriminals &#8212; and what we should expect to see in 2022.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44640","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-31T13:53:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Copycat and fad hackers will be the bane of supply chain security in 2022\",\"datePublished\":\"2021-12-31T13:53:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/\"},\"wordCount\":1236,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/\",\"name\":\"Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2021-12-31T13:53:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\\\/2020\\\/03\\\/18\\\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\\\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Copycat and fad hackers will be the bane of supply chain security in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/","og_locale":"en_US","og_type":"article","og_title":"Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-31T13:53:18+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Copycat and fad hackers will be the bane of supply chain security in 2022","datePublished":"2021-12-31T13:53:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/"},"wordCount":1236,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/","url":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/","name":"Copycat and fad hackers will be the bane of supply chain security in 2022 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","datePublished":"2021-12-31T13:53:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49d9e9b2c43f91c2da4a22f58d74310f2ecd424d\/2020\/03\/18\/7c2e2258-7566-4e66-9059-a1a8aedf00b4\/2020-03-18-at-12-23-32-pm.jpg?width=220&amp;height=165&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/copycat-and-fad-hackers-will-be-the-bane-of-supply-chain-security-in-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Copycat and fad hackers will be the bane of supply chain security in 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44640"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44640\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}