A new report published on December 19, 2025, highlights a growing and insidious threat to supply chain security: the exploitation of web-based portals on manufacturer websites. Attackers are systematically targeting forms such as supplier portals, warranty registrations, and Return Merchandise Authorization (RMA) forms using automated bots and SQL Injection (SQLi) attacks. These portals, often running on legacy systems, serve as a soft target for stealing credentials, financial records, and intellectual property. The report indicates the problem is widespread, with 85% of surveyed manufacturing firms reporting a security incident related to these forms and 42% confirming a data breach. This makes manufacturers an unwitting pivot point for attackers to compromise their more secure customers in critical sectors like defense and finance.
Cybercriminals are targeting the manufacturing sector as a weak link in the broader supply chain. Instead of directly attacking well-defended organizations in finance or defense, attackers compromise their less-secure manufacturing suppliers to gain access or steal data that can be used to attack the ultimate target.
The primary attack vector is the exploitation of public-facing web forms and portals on manufacturer websites. These forms are often business-critical but may lack modern security controls.
Targeted Forms:
Attack Techniques:
The core of the problem lies in legacy web applications that persist within manufacturing environments. These systems often lack basic security features common in modern applications:
An attacker can use an automated scanner to identify a vulnerable form on a manufacturer's website. By successfully executing an SQLi attack, they could potentially:
This stolen data or access can then be used to launch highly targeted phishing campaigns or other attacks against the manufacturer's partners and customers.
This attack trend has severe implications for the entire supply chain.
UNION, SELECT, or --. Reference D3-NTA: Network Traffic Analysis.Developers must use parameterized queries and proper input validation to prevent SQL injection attacks.
Enforcing MFA on all external portals protects against credential stuffing and brute-force attacks by bots.
Mapped D3FEND Techniques:
Manufacturers must prioritize hardening their web applications to defend against SQL injection. The most effective method is for developers to rewrite database queries to use parameterized statements (also known as prepared statements). This practice separates the SQL command from the user-supplied data, making it impossible for an attacker to alter the query's logic. In addition, all user input must be strictly validated on the server-side against an allowlist of expected characters and formats. These two coding practices are fundamental to eliminating the SQL injection vulnerabilities that attackers are exploiting in these supplier portals.
Deploy a modern Web Application Firewall (WAF) in front of all public-facing web portals. A WAF can provide a critical layer of defense, especially for legacy applications that cannot be easily patched or rewritten. Configure the WAF with a managed ruleset to detect and block common attack patterns, including SQL injection, cross-site scripting (XSS), and malicious bot activity. The WAF can identify and block requests from known malicious IP addresses and those containing signatures of tools like 'sqlmap', providing a strong first line of defense against the automated attacks described in the report.
To combat the threat of credential theft and abuse, manufacturers must enforce multi-factor authentication (MFA) on all supplier and customer portal accounts. Since the report indicates that 61% of firms collect authentication credentials via these forms, it is clear they are a prime target. MFA ensures that even if an attacker successfully steals a password via SQL injection or another method, they cannot log in without the second factor. This is a highly effective control for preventing account takeover and subsequent data theft from authenticated portal sessions.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats