Supply Chain Attack
A supply chain attack is an attack that does not target a victim directly but rather one of its upstream suppliers — software vendor, open-source library, MSP — to indirectly reach a large number of targets via a compro…
A supply chain attack is an attack that does not target a victim directly but rather one of its upstream suppliers — software vendor, open-source library, MSP — to indirectly reach a large number of targets via a compromised update or component.
Landmark incidents include SolarWinds (2020), Codecov (2021), Log4Shell (2021), 3CX (2023) and the xz-utils affair (2024), where a malicious maintainer injected a backdoor into a foundational Linux library.
Countermeasures include SBOMs, artifact signing (Sigstore, in-toto, SLSA), build isolation, vendored dependencies and reducing the surface area of third-party dependencies.
