Software Supply Chain Attacks are Skyrocketing

Global supply chain issues continue to persist to the point that they are circumventing earlier predictions that they would begin easing by now. They are getting worse, not better, due in part to prolonged Covid-19 lockdowns in parts of China and Russia’s invasion of Ukraine, which cut off their exports.

This is no small thing given that Ukraine is a major global supplier of foodstuffs and the world’s leading source of neon, a gas needed for the lasers used in the chip-making process – and the last thing needed in the already supply-constrained semiconductor industry.

As significant as these supply chain issues are, yet another big one is now coming to the forefront – software-based supply chain attacks. These garner far less attention even though they distribute substantially more pain than other types of cyberattacks.

According to a study by Argon Security, an Israeli cybersecurity firm that specializes in protecting the integrity of the software supply chain, software supply chain attacks grew by more than 300 percent in 2021 in comparison to 2020. And another recent study of more than 400 IT executives and managers by Anchore Enterprise, a California-based developer of a security-centric software supply chain management platform, found that three in five companies last year were targeted by software supply chain attacks.

A supply chain attack, also known as a third-party attack, occurs when hackers infiltrate an organization’s system through an outside partner or provider with poor security practices and access to its systems and data. More suppliers and service providers are touching sensitive data than ever, dramatically expanding the attack surface of most enterprises in recent years. Any company that produces software or hardware for other organizations is a potential target of attackers.

Cybercriminals are increasingly targeting software supply chains because these attacks allow them to compromise hundreds or thousands of victims through a single breach, while simultaneously affording them extensive internal access in the systems. Any breach can be damaging, of course, but a supply chain attack often is far worse because it frequently has a higher level of access to the network. Hackers can also be harder to detect.

One major example of a software supply chain breach last summer involved Kaseya, a leading provider of IT and security management solutions for managed services providers (MSPs) and small and medium-sized businesses. Hackers found a flaw in the company’s remote management software, enabling them to spread ransomware through the company’s software update processes and ultimately to the end users of the product. Up to 1,500 business were impacted. Similar attacks have occurred through other widely used software products, such as those provided by SolarWinds and Microsoft Exchange.

The SolarWinds incident in December 2020, believed to be a nation-state attack on thousands of government and corporate networks, was typical in that most software supply chain assaults target companies as an inroad to more valuable targets. If successful, the backdoor of a huge enterprise network is opened wide and, frequently, an entire supply chain as well.

Because supply chain attacks break into vulnerable, often smaller companies as a means to break into much bigger organizations, the disheartening upshot is that a company’s security no longer depends solely on its own resilience.

It’s no surprise, then, that successful supply chain attacks are distressingly common. According to BlueVoyant, a New York-based cybersecurity company, more than 80 percent of sizable organizations have experienced a data breach in recent years as a result of security vulnerabilities in their supply chains. The penetration rate is as high as it is, concludes BlueVoyant research, because the average big company has, on average, more than 1,000 vendors in its supply ecosystem.

Another growing problem is a new type of software supply chain attack that infiltrates open-source software, which, historically, has contained numerous security vulnerabilities.

According to Sonatype, a software analytics company that evaluates the security of corporate codebases, the number of such attacks exploded more than six-fold in 2021. (Some good news here is that the increasing number of such attacks may decline this year as software developers work harder to update and better protect their open-source software components.)

To help mitigate these and other software supply chain issues, organizations should stop using security technology that relies on hallmarks of previously encountered threats to try to stop the next attack. This approach leaves companies open to attacks that use new infrastructure and new techniques with as-yet unknown signatures.

Minimizing the risk of a software supply chain attack also requires a never-ending loop of risk and compliance management. Some attacks may still get through, but fewer – and that’s a step in the right direction. To this end, here are some tips.

+ Know your software. Keep a thorough inventory of all open source and proprietary off-the-shelf tools used by your organization. You can’t protect what you don’t know you have.

+ Ask prospective vendors for compliance verifications. This then requires your team to verify the existence and proper functioning of all required security processes and controls used by the vendor to protect their equipment, data and systems. Also ask your vendor to walk you through each step in their supply chain to maintain the required level of security throughout the supply chain journey.

+ Keep an eye out for known vulnerabilities and apply the appropriate software patches. This is crucial because hackers use automated tools to constantly scan millions of connected devices that haven’t applied patches against vulnerabilities. New updates respond to new threats.

+ Use access controls and two-factor authentication to heighten security. Also run security software with multiple layers of protection.

Lastly, users’ right of access to data should be limited to the minimum level necessary and the efficient use of various technologies should be checked regularly. Too many companies use multiple tools to manage the same things. They don’t appreciate that the greater the sprawl, the faster security controls collide and decay.

.

Featured

  • 2025 Gun Violence Statistics Show Signs of Progress

    Omnilert, a national leader in AI-powered safety and emergency communications, has released its 2025 Gun Violence Statistics, along with a new interactive infographic examining national and school-related gun violence trends. In 2025, the U.S. recorded 38,762 gun-violence deaths, highlighting the continued importance of prevention, early detection, and coordinated response. Read Now

  • Big Brand Tire & Service Rolls Out Interface Virtual Perimeter Guard

    Interface Systems, a managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network services for multi-location enterprises, today announced that Big Brand Tire & Service, one of the nation’s fastest-growing independent tire and automotive service providers, has eliminated costly overnight break-ins and significantly reduced trespassing and vandalism at a high-risk location. The company achieved these results by deploying Interface Virtual Perimeter Guard, an AI-powered perimeter security solution designed to deter incidents before they occur. Read Now

  • The Evolution of ID Card Printing: Customer Challenges and Solutions

    The landscape of ID card printing is evolving to meet changing customer needs, transitioning from slow, manual processes to smart, on-demand printing solutions that address increasingly complex enrollment workflows. Read Now

  • TSA Awards Rohde & Schwarz Contract for Advanced Airport Screening Ahead of Soccer World Cup 2026

    Rohde & Schwarz, a provider of AI-based millimeter wave screening technology, announced today it has won a multi-million dollar award from TSA to supply its QPS201 AIT security scanners to passenger security screening checkpoints at selected Soccer World Cup 2026 host city airports. Read Now

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.