Original Article Text

Click to Toggle View

Why a secure software development life cycle is critical for manufacturers. For all the scary talk about cyberattacks from vendors and industry experts, relatively few attacks are actually devastating. But the Jaguar Land Rover (JLR) attack was. The JLR breach wasn’t some nuisance attack that cost a few hundred thousand dollars. It completely shut down production for weeks, will likely cost the British economy more than $2 billion and affected as many as 5000 organizations, according to Reuters. Real people lost their jobs. The U.K. government had to step in with a loan guarantee of nearly $2 billion to keep JLR running. A nightmare come true The JLR attack was the nightmare scenario manufacturers knew could theoretically happen. When it actually happened, it sent many manufacturing organizations scrambling to figure out how they could prevent suffering the same fate. One issue became clear immediately: The supply chain is one of the weakest security links for manufacturers. After all, the JLR attack originated in the company’s supply chain with the compromise of credentials used by third-party contractors. How are attackers breaking into supply chains? One powerful tactic involves targeting the development tools and processes for software applications that manufacturers and their supply chain partners use. It might not be the type of attack that brought JLR down, or it might; full details of the origin of the attack are not public. But an important lesson is that if manufacturers and their supply chain partners are not vigilant about making sure software providers use secure development practices, they’re leaving themselves open to the level of attack JLR suffered.  Supply chains in the crosshairs Attacks on supply chains via software development aren’t new; but they remain powerful and dangerous. Some of the most famous cyberattacks ever committed involved the tactic, including an infamous 2020 attack on SolarWinds, a 2021 attack on Kaseya VSA and a 2023 attack on VoIP provider 3CX. Attackers have developed a new approach more recently: They’re releasing malicious node package managers (NPMs) into the software development process. JavaScript developers use NPMs to share and install reusable code. When NPMs are malicious, an attack can spread quickly, endure for months and find its way into all sorts of applications. One of the more recent examples of NPM targeting is the Shai-Hulud cryptostealer, which has reportedly compromised more than 500 NPM packages, including several used by cybersecurity providers. NPM attacks are just one method attackers have found to work their way into supply chains. For example, attackers can also compromise software vendors’ updates and exploit software vulnerabilities. The bottom line is that supply chain applications are vulnerable, and manufacturers need to be sure that the apps their partners use are safe. All-in-one integrated backup and cybersecurity platform for MSPs Acronis Cyber Protect Cloud integrates data protection, cybersecurity, and endpoint management. Easily scale cyber protection services from a single platform – while efficiently running your MSP business. A need for closer evaluations With their supply chains at risk, manufacturers need to evaluate existing and potential partners with secure software development life cycle (SSDLC) practices. In most operational technology (OT) environments, procurement evaluations focus heavily on vendor financial health, service-level agreements and infrastructure security. But they often overlook vulnerabilities in the software development process — issues that can sabotage supply chain apps. That’s why ensuring rigorous SSDLC practices is so important for both manufacturers and their supply chain partners. When manufacturers don’t ensure SSDLC practices among their partners, they risk facing operational downtime, financial losses, compliance violations and reputational damage. SSDLC: More than compliance checkboxes What makes SSDLC so important and effective? For starters, it’s mandated under the EU NIS 2 directive, which requires a formal, documented SSDLC process. It also represents a fundamental shift from treating security as a post-development add-on to embedding it throughout the software creation process. A vulnerability caught during requirements analysis may take hours to fix. That same flaw discovered post-release could require weeks of emergency response. In practice, mature SSDLC implementation includes: For manufacturers, that means the software controlling production lines, managing critical systems and connecting industrial operations has security embedded from the first line of code to final deployment. Reliable proof of secure development: IEC 62443-4-1 certification Industry certifications are a reliable measure of use of SSDLC in the development process. While various security certifications exist, IEC 62443-4-1 holds particular significance for manufacturing supply chains. he IEC 62443 family of standards specifically addresses industrial automation and control systems security, the exact environment where manufacturers operate. Within this framework, IEC 62443-4-1 focuses exclusively on secure product development lifecycle requirements and provides one of the most rigorous and relevant standards for evaluating OT software suppliers. Unlike general information security frameworks, IEC 62443-4-1 certification demonstrates that a supplier has implemented practices specifically designed for industrial environments where uptime is critical, patching windows may be limited and physical-world consequences can result from software failures. IEC 62443-4-1 certification provides concrete, independently verified evidence that software suppliers are systematically engineering security into every product, not just promising it. For original equipment manufacturers (OEMs), system integrators and end customers in manufacturing and critical infrastructure, this provides a critical foundation of trust. A rethinking of evaluations When evaluating partners with SSDLC in mind, manufacturers should: Manufacturers can no longer afford to treat supplier security evaluation as an exercise focused solely on infrastructure and operations. The development lifecycle is where vulnerabilities originate — and where manufacturers must make sure they’re prevented. About Acronis TRU The Acronis Threat Research Unit (TRU) is a team of cybersecurity experts specializing in threat intelligence, AI and risk management. The TRU team researches emerging threats, provides security insights, and supports IT teams with guidelines, incident response and educational workshops. See the latest TRU research Sponsored and written by Acronis.

Daily Brief Summary

DATA BREACH // JLR Attack Exposes Critical Supply Chain Vulnerabilities in Manufacturing

Jaguar Land Rover experienced a significant breach that halted production for weeks, impacting up to 5,000 organizations and potentially costing the British economy over $2 billion.

The breach originated from compromised credentials within JLR's supply chain, highlighting the vulnerability of third-party contractor relationships in manufacturing.

The U.K. government intervened with a nearly $2 billion loan guarantee to support JLR's recovery efforts, emphasizing the economic impact of such breaches.

Attackers increasingly target software development processes, including malicious node package managers, which can infiltrate supply chains and cause widespread disruption.

Manufacturers are urged to adopt a secure software development life cycle (SSDLC) to mitigate risks, as mandated by the EU NIS 2 directive.

IEC 62443-4-1 certification is recommended for evaluating software suppliers, ensuring security is embedded from development to deployment in industrial environments.

The JLR incident serves as a critical reminder for manufacturers to reassess supply chain security, focusing on SSDLC to prevent operational and financial repercussions.