Spotlight on Supply Chain Risk: Reports Warn of Escalating SaaS-to-SaaS Attacks

Growing Threat of SaaS and Digital Supply Chain Attacks Highlighted by New Reports and Security Solutions

INFORMATIONAL
January 22, 2026
4m read
Supply Chain AttackCloud SecurityThreat Intelligence

Related Entities

Organizations

Products & Tech

SaaS

Other

Seagate Technology Wyndham Hotels and Resorts

Full Report

Executive Summary

January 22, 2026, brought the escalating threat of digital supply chain attacks into sharp focus. A new report from Black Kite highlighted the significant cyber exposure within the retail and wholesale industries due to their complex and interconnected supplier ecosystems. This warning was amplified by the launch of a new end-to-end SaaS supply chain security solution from Obsidian Security, designed to address the growing risk of SaaS-to-SaaS compromises. These events illustrate a critical shift in the threat landscape, where attackers are increasingly targeting trusted relationships (T1199 - Trusted Relationship) between organizations and between their cloud applications. The modern, distributed enterprise, reliant on a web of third-party vendors and integrated SaaS apps, faces a new class of systemic risk that requires a new approach to security.


Threat Overview

The digital supply chain threat manifests in two primary ways discussed today:

  1. Vendor-Based Attacks: As detailed in the Black Kite report, attackers compromise a smaller, less secure third-party supplier to gain access to a larger, primary target. This is particularly effective in industries like manufacturing and tech, where sensitive intellectual property (CAD models, firmware designs) is shared with contractors. A ransomware group is reportedly exploiting this vector by compromising a supplier to steal and ransom proprietary designs from major tech companies.

  2. SaaS-to-SaaS Attacks: Modern businesses rely on dozens or hundreds of interconnected SaaS applications (e.g., Salesforce, Slack, Microsoft 365). These applications are often granted broad API permissions to access data in one another. As Obsidian Security notes, an attacker who compromises one SaaS application can use its permissions to pivot and attack every other application it's connected to. The Salesloft-Drift incident, which affected over 700 organizations, is a prime example of this cascading risk.

Impact Assessment

  • Intellectual Property Theft: Compromise of a supplier can lead to the theft of trade secrets, engineering documents, and other sensitive IP, resulting in significant competitive and financial damage.
  • Cascading Data Breaches: A single SaaS app compromise can lead to data exposure across an entire ecosystem of connected apps, massively expanding the blast radius of an incident.
  • 'Shadow' Integrations: As noted by Grace Liu, CIO at Seagate Technology, employees often create app-to-app integrations without IT oversight. These 'shadow integrations' create unknown and unmonitored pathways for data movement and potential breaches.
  • Systemic Risk: The high degree of interconnectedness means that a vulnerability in a single popular SaaS application or a breach at a common supplier can have an industry-wide impact, affecting hundreds or thousands of organizations simultaneously.

Compliance Guidance

Organizations must evolve their risk management programs to account for this new threat surface:

  1. Third-Party Risk Management (TPRM): Go beyond simple questionnaires. Use external attack surface management (EASM) and security rating services to continuously monitor the security posture of your critical suppliers.
  2. SaaS Security Posture Management (SSPM): Deploy solutions like the one announced by Obsidian Security to map all SaaS-to-SaaS integrations, including 'shadow' ones. The goal is to understand what data is being shared and with what permissions.
  3. Principle of Least Privilege for APIs: Review all SaaS application integrations. Grant API keys and OAuth tokens the absolute minimum permissions required for their function. Revoke unnecessary or overly broad permissions (e.g., global read/write access).
  4. Incident Response Planning: Update incident response plans to include scenarios involving a compromised supplier or SaaS provider. This includes communication plans and procedures for revoking API keys and isolating affected applications.

Detection & Response

  • Monitor API Logs: Ingest and analyze API access logs from critical SaaS platforms (e.g., Microsoft 365, Google Workspace, Salesforce). Look for anomalous activity, such as an integration suddenly accessing unusual data types or a huge volume of records. This aligns with D3FEND's Resource Access Pattern Analysis.
  • User and Entity Behavior Analytics (UEBA): Apply UEBA to detect when a service account or integration token begins behaving anomalously, which could indicate a compromise.

Timeline of Events

1
January 22, 2026
Black Kite releases its '2026 Wholesale & Retail Report' on digital supply chain attacks.
2
January 22, 2026
Obsidian Security announces its end-to-end SaaS supply chain security solution.
3
January 22, 2026
This article was published

MITRE ATT&CK Mitigations

Extend vulnerability and security posture management to include third-party suppliers and integrated SaaS applications.

Audit

M1047enterprise

Continuously audit SaaS integrations, API permissions, and data flows to identify and remediate risks.

D3FEND Defensive Countermeasures

To combat SaaS supply chain attacks, organizations must analyze the resource access patterns of their integrated applications. This involves using a SaaS Security Posture Management (SSPM) tool to ingest audit logs from all critical SaaS platforms (e.g., Microsoft 365, Salesforce, Slack). The tool should baseline the normal API activity of each integration—what data it typically accesses, how much, and when. Alerts should be configured for significant deviations, such as a marketing automation tool suddenly attempting to access financial data in an ERP system, or a CRM integration exfiltrating the entire contact database. This behavioral analysis is key to spotting a compromised application being abused by an attacker.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackSaaSCloud SecurityThird-Party RiskAPI Security

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading