Software supply chains are coming under attack more than ever

Supply Chain
(Image credit: Shutterstock.com / TMLsPhotoG)

Cyberattacks against software supply chains have gotten so widespread that at least one of them happens every two days, a report from Cyble has claimed.

Software supply chain attack happens when a threat actor compromises a software development company, or a platform, that another company uses in its products and services. As a result, that other company ends up being compromised as well, and most of the time, hackers end up stealing business and customer data, or hijacking company source code.

As per the report, in the six-month period between February and August 2024, there were at least 90 successful supply chain attacks, with the report also citing “claims of successful supply chain attacks” on the dark web.

US firms in the crosshairs

Most of the attacks targeted IT providers, the researchers further explained, adding that it was unsurprising given these companies’ reach. A third of the total (30 attacks) targeted IT providers, followed by technology product companies with 14 attacks. Aerospace & defense (9 breaches), manufacturing (9 breaches), and healthcare (8 breaches) were the next most frequent victims of supply chain attacks.

IT providers might be the biggest target, but very few industries are actually spared. Cyble says that of the 25 verticals it tracked, 22 suffered at least one supply chain attack this year.

Geographically, companies located in the United States suffered the most (31 attacks), followed by those in the UK (10). Germany and Australia were next with five each, while Japan and India had four.

Cyble says that the most effective place to control software supply chain risks is in the continuous integration and development (CI/CD) process.

“Carefully vetting your partners and suppliers and requiring good security controls in contracts are ways to improve third-party security,” the researchers concluded.

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
Security
Removing software supply chain blind spots that put public sector organizations at risk
A graphic showing someone on a tablet working through a supply chain.
How phishing attacks are hitting the supply chain – and how to fight back
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
Representational image of a hacker
The 10 worst software disasters of 2024: cyberattacks, malicious AI, and silent threats
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras