Software Supply Chain Attacks Skyrocket to Record High, Driven by Ransomware Gangs

Cyble Report: Software Supply Chain Attacks Surge to Record High in October 2025

HIGH
November 7, 2025
5m read
Supply Chain AttackRansomwareThreat Intelligence

Related Entities

Threat Actors

Qilin AkiraKyberBlackShrantac

Organizations

Full Report

Executive Summary

Threat intelligence firm Cyble reports that software supply chain attacks surged to a new record in October 2025, with 41 attacks claimed on dark web data leak sites. This represents a more than 30% increase over the previous monthly peak and more than double the average monthly rate seen prior to April 2025. The report identifies ransomware groups Qilin and Akira as the dominant forces behind this escalation. These groups are strategically targeting third-party technology providers to gain access to their downstream customers. The most impacted industries include information technology, finance, energy, and government, signaling a dangerous and widespread threat to organizations through their trusted digital supply chains.


Threat Overview

The data, compiled from ransomware leak sites, shows a clear and sustained increase in supply chain attacks throughout 2025. After averaging 13 attacks per month from early 2024 to March 2025, the rate spiked and has averaged over 28 per month since April 2025, culminating in the record 41 incidents in October.

This trend reflects a strategic shift by threat actors. Instead of attacking hardened targets directly, they are finding it more efficient to compromise a single, less-secure software vendor or service provider and leverage that access to attack their entire customer base. This provides a significant return on investment for the attackers.

Key Threat Actors

  • Qilin: This ransomware group has been highly active, recently claiming an attack on a U.S. technology provider for law enforcement, where they allegedly stole source code and client data. They also claimed responsibility for attacks on three U.S. energy cooperatives.
  • Akira: Alongside Qilin, Akira is a leading perpetrator of supply chain attacks in 2025.
  • Kyber: A newly identified ransomware group that contributed to the trend by leaking 141GB of data allegedly stolen from a major U.S. defense and aerospace contractor.

Technical Analysis

The attacks fall under the broad MITRE ATT&CK Tactic of Initial Access, specifically T1195 - Supply Chain Compromise. This can manifest in several ways:

Once the ransomware groups gain access to the downstream victims, they proceed with their standard playbook: lateral movement (T1021.001 - Remote Desktop Protocol), defense evasion (T1562.001 - Disable or Modify Tools), data exfiltration (T1537 - Transfer Data to Cloud Account), and encryption for impact (T1486 - Data Encrypted for Impact).

Impact Assessment

Supply chain attacks have a cascading effect, multiplying the impact of a single breach. A compromise at one software provider can lead to dozens or hundreds of downstream victims. The most targeted sectors—IT, finance, energy, and government—are critical to national infrastructure and the economy, making these attacks particularly damaging. For victim organizations, the result is often a full-scale ransomware incident, leading to operational shutdown, data loss, regulatory fines, and severe reputational harm. The attack on the law enforcement tech provider, for example, could expose sensitive police data and compromise ongoing investigations.

Detection & Response

  • Third-Party Risk Management: Detection begins before the attack. Organizations must have a robust third-party risk management (TPRM) program to assess the security posture of their critical suppliers. D3FEND Technique: D3-VAM: Vendor Assessment and Monitoring.
  • Egress Traffic Monitoring: Monitor outbound network traffic for signs of data exfiltration or connections to known ransomware C2 infrastructure. A compromised third-party tool making anomalous connections is a major red flag. D3FEND Technique: D3-OTF: Outbound Traffic Filtering.
  • Behavioral Monitoring: Use EDR and identity management solutions to monitor for suspicious behavior originating from trusted third-party software or service accounts. An alert on a service account suddenly accessing large volumes of data is a key indicator. D3FEND Technique: D3-RAPA: Resource Access Pattern Analysis.

Mitigation and Recommendations

  1. Zero Trust Architecture: Do not implicitly trust traffic or processes originating from third-party software. Enforce the principle of least privilege, ensuring that third-party tools have only the absolute minimum access required to function. D3FEND Technique: D3-UAP: User Account Permissions.
  2. Software Bill of Materials (SBOM): Demand SBOMs from your software vendors. An SBOM provides a detailed inventory of all components in a piece of software, allowing you to quickly identify if you are affected when a vulnerability is discovered in a dependency.
  3. Network Segmentation: Segment the network to isolate third-party tools and services. This can prevent a compromise in one vendor's tool from spreading across the entire corporate network. D3FEND Technique: D3-NI: Network Isolation.
  4. Incident Response Planning: Update incident response plans to specifically include supply chain attack scenarios. This should involve clear communication plans with vendors and a process for rapidly disabling or isolating compromised third-party connections.

Timeline of Events

1
April 1, 2025
Software supply chain attacks begin to rise, averaging more than 28 per month.
2
October 1, 2025
A record 41 software supply chain attacks are claimed in a single month.
3
November 7, 2025
This article was published

MITRE ATT&CK Mitigations

Continuously scan both internal assets and assess the security of third-party vendors.

Isolate systems that run third-party software to limit the blast radius of a supply chain compromise.

Apply Zero Trust principles and least privilege access for all third-party tools and services.

D3FEND Defensive Countermeasures

To mitigate the risk of supply chain attacks from groups like Qilin and Akira, enforce the principle of least privilege for all third-party software and service accounts. Do not grant domain admin rights to a managed service provider or a third-party tool. Instead, create highly restricted service accounts that have only the specific permissions needed to perform their function. For example, a backup agent should only have rights to read the data it needs to back up and write to the backup target, not to modify system files or access other parts of the network. This severely limits the attacker's ability to move laterally after compromising the supply chain vendor.

Implement strict network segmentation to create isolated enclaves for third-party tools. Any server or workstation running software from a third-party vendor should be placed in a dedicated VLAN with strict firewall rules governing its communication. It should only be allowed to communicate with the specific internal systems it needs to manage and its own legitimate cloud infrastructure. All other traffic, especially attempts to scan the internal network or connect to other segments, should be blocked and trigger an alert. This containment strategy ensures that even if a supply chain attack succeeds, the breach is confined and cannot spread to the entire enterprise.

Sources & References

Leak Site Ransomware Victims Spike 13% in a Year
Infosecurity Magazine (infosecurity-magazine.com) November 6, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackRansomwareQilinAkiraCybleDark Web

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading