Redazione RHC : 14 July 2025 07:26
As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly common. These attacks are aimed at compromising companies through their suppliers and business partners.
Supply chain attacks can pose a significant threat to businesses and organizations, as they can compromise their security and that of the products and services they provide to customers.
In this article, we’ll explore the phenomenon of supply chain attacks: what they are, how a supply chain attack occurs, the most common attacks, and how organizations can take measures to protect themselves from these threats and how to choose suppliers.
Supply-chain attacks are malicious acts perpetrated by attackers against one or more organizations in the supply chain of products or services.
These attacks can occur through a variety of methods, including the infiltration of malware or ransomware into one of the parties in the supply chain, the insertion of malicious hardware or software components into products or services provided by a supplier, or the interception of sensitive information during data transmission between parties in the supply chain.
Supply chain attacks pose a particularly serious threat to businesses, as they can compromise the security of the products and services provided to customers. For example, a supply chain attack against a medical device manufacturer could compromise the security of the devices themselves, putting patients’ health at risk.
In short, a cybercriminal targeting a large company could take advantage of security vulnerabilities in a supplier’s IT infrastructure to attack them.
There are several things you can monitor to choose a supplier and reduce the risk of a supply chain attack. The main ones could be:
In summary, choose a reliable and experienced supplier with a solid reputation, adequate security standards, a positive track record, and Documented security policies can help reduce the risk of a supply chain attack.
Companies can take several measures to protect themselves from supply chain attacks. First, it’s important for companies to conduct a risk assessment to identify weaknesses in their supply chain and develop a risk mitigation plan. Some specific measures companies can take include:
One of the most important things to protect against supply chain attacks is the contractualization of specific security requirements between the client and the supplier and the execution of specific recurring checks to verify the suitability of the implementation of these requirements.
Obviously, the security requirements that must be included in the contracts must be identified through specific risk analyses that must be performed on the contracted service.
Including specific penalties within the contract for failure to implement security requirements provides an excellent incentive for supplier companies to implement proper IT security on the IT infrastructures made available to the Client.
Security measures within contracts are very important for protecting the supply chain. However, their effectiveness depends on the company’s ability to enforce these clauses. Auditing activities performed by the client are essential to ensure that suppliers comply with security clauses and that the company’s data and systems are adequately protected.
Furthermore, third-party companies should also continuously monitor their own systems and networks for suspicious activity and take preventative actions to mitigate the risk of supply chain attacks. This may include using threat monitoring software and advanced security solutions.
Ultimately, securing the supply chain is a critical challenge for all businesses. However, adopting adequate security measures and monitoring them over time allows companies to reduce the risk of attacks and ensure adequate levels of security.
Supply chain attacks have become increasingly common in recent years, and several security reports point to a growing threat of these types of attacks.
One of the most notable recent supply chain attacks was the distributed ransomware attack on Kaseya, a US-based IT management software company. In the summer of 2021, a Russian-based cybercriminal group known as REvil exploited a zero-day vulnerability in one of Kaseya’s solutions to introduce ransomware payloads into software update packages.
Once all clients had downloaded the software update, the ransomware spread to hundreds of Kaseya customers. This attack caused significant damage to many businesses, including hospitals, healthcare centers, government agencies, and companies of various sizes, but it highlighted the importance of this type of cyberattack.
Even earlier, another well-known supply chain attack targeted SolarWinds, a US network management software company. In 2020, an unknown attacker compromised SolarWinds’ update software, inserting malware known as SUNBURST into the update package distributed to SolarWinds customers.
This attack compromised several US government agencies and many other organizations around the world.
Another well-known attack involved the CCleaner software. In 2017, a group of attackers compromised the CCleaner registry cleaner distributed by the cybersecurity company Avast. The attackers used this backdoor to distribute malware to several CCleaner users around the world.