Question
Steve's company was hit by a cyber-attack. Upon investigation, the malicious network communication was initiated from one of the components of IT monitoring software in
Steve's company was hit by a cyber-attack. Upon investigation, the malicious network communication was initiated from one of the components of IT monitoring software in use that has a valid digital signature of the software vendor. He confirmed that the component is exactly the same file which can be downloaded from the vendor's legitimate update server. Some of other companies which use the same software is also discovering the same symptom. Choose the most suitable description for this attack.
Vulnerability of the IT monitoring software was exploited.
Hackers intruded the network of Steve's company and disabled the IT monitoring software.
Ransomware modified the original software component.
Software supply chain attack seemed to have happened.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started