A new report published on December 19, 2025, highlights a growing and insidious threat to supply chain security: the exploitation of web-based portals on manufacturer websites. Attackers are systematically targeting forms such as supplier portals, warranty registrations, and Return Merchandise Authorization (RMA) forms using automated bots and SQL Injection (SQLi) attacks. These portals, often running on legacy systems, serve as a soft target for stealing credentials, financial records, and intellectual property. The report indicates the problem is widespread, with 85% of surveyed manufacturing firms reporting a security incident related to these forms and 42% confirming a data breach. This makes manufacturers an unwitting pivot point for attackers to compromise their more secure customers in critical sectors like defense and finance.
Cybercriminals are targeting the manufacturing sector as a weak link in the broader supply chain. Instead of directly attacking well-defended organizations in finance or defense, attackers compromise their less-secure manufacturing suppliers to gain access or steal data that can be used to attack the ultimate target.
The primary attack vector is the exploitation of public-facing web forms and portals on manufacturer websites. These forms are often business-critical but may lack modern security controls.
Targeted Forms:
Attack Techniques:
The core of the problem lies in legacy web applications that persist within manufacturing environments. These systems often lack basic security features common in modern applications:
An attacker can use an automated scanner to identify a vulnerable form on a manufacturer's website. By successfully executing an SQLi attack, they could potentially:
This stolen data or access can then be used to launch highly targeted phishing campaigns or other attacks against the manufacturer's partners and customers.
This attack trend has severe implications for the entire supply chain.
UNION, SELECT, or --. Reference D3-NTA: Network Traffic Analysis.Developers must use parameterized queries and proper input validation to prevent SQL injection attacks.
Enforcing MFA on all external portals protects against credential stuffing and brute-force attacks by bots.
Mapped D3FEND Techniques:
Manufacturers must prioritize hardening their web applications to defend against SQL injection. The most effective method is for developers to rewrite database queries to use parameterized statements (also known as prepared statements). This practice separates the SQL command from the user-supplied data, making it impossible for an attacker to alter the query's logic. In addition, all user input must be strictly validated on the server-side against an allowlist of expected characters and formats. These two coding practices are fundamental to eliminating the SQL injection vulnerabilities that attackers are exploiting in these supplier portals.
Deploy a modern Web Application Firewall (WAF) in front of all public-facing web portals. A WAF can provide a critical layer of defense, especially for legacy applications that cannot be easily patched or rewritten. Configure the WAF with a managed ruleset to detect and block common attack patterns, including SQL injection, cross-site scripting (XSS), and malicious bot activity. The WAF can identify and block requests from known malicious IP addresses and those containing signatures of tools like 'sqlmap', providing a strong first line of defense against the automated attacks described in the report.
To combat the threat of credential theft and abuse, manufacturers must enforce multi-factor authentication (MFA) on all supplier and customer portal accounts. Since the report indicates that 61% of firms collect authentication credentials via these forms, it is clear they are a prime target. MFA ensures that even if an attacker successfully steals a password via SQL injection or another method, they cannot log in without the second factor. This is a highly effective control for preventing account takeover and subsequent data theft from authenticated portal sessions.
A report is published detailing the trend of attacking manufacturers via web portals.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.