New analysis reveals an alarming surge in software supply chain attacks, which reached a record high in late 2025. October 2025 saw 41 documented incidents, a figure over 30% higher than the previous peak in April 2025. This escalating threat is primarily driven by an increase in ransomware campaigns targeting third-party vendors and the exploitation of vulnerabilities in widely used software components. The most heavily impacted sectors include information technology, finance, manufacturing, and healthcare. The growing severity of this threat vector has been recognized by OWASP, which introduced a new category, 'Software Supply Chain Failures,' in its 2025 Top 10. The data suggests a dangerous disconnect, with 92% of organizations trusting their suppliers' security practices, while nearly half of all businesses still experienced a breach in the last year.
The trend of increasing software supply chain attacks highlights a strategic shift by threat actors. Instead of attacking hardened targets directly, they are compromising their less secure suppliers to gain trusted access. The information technology sector is the primary target, with nearly 120 attacks recorded recently, as compromising a single Managed Service Provider (MSP) or software vendor can provide access to hundreds or thousands of downstream victims.
Key drivers of this trend include:
This trend represents a Supply Chain Compromise (T1195) on a macro scale, where the entire software ecosystem is being targeted.
Attackers are employing several methods to execute software supply chain attacks:
T1195.002).These methods exploit the Trusted Relationship (T1199) between a business and its software suppliers or between a developer and a software library.
Software supply chain attacks have a disproportionately large impact, creating systemic risk for entire industries and economies. A single attack can lead to thousands of downstream breaches, as seen in the SolarWinds incident. The financial and reputational damage is immense, not only for the initial vendor but for every organization compromised as a result. This trend forces a paradigm shift in security, moving from a focus solely on perimeter defense to a more comprehensive approach that includes rigorous vendor risk management, software composition analysis, and a Zero Trust mindset toward all third-party code and services.
powershell.exe or making connections to unknown domains.M1045 - Code Signing): Enforce strict code signing policies to ensure the integrity of software updates and internal applications. Only allow executables signed by trusted publishers to run.M1016 - Vulnerability Scanning): Continuously scan for vulnerabilities not just in your own code, but in all the third-party libraries and components you use. Prioritize patching based on exploitability and asset criticality.Enforcing code signing ensures the integrity of software updates and prevents the execution of tampered binaries.
Using Software Composition Analysis (SCA) tools to continuously scan for vulnerabilities in third-party dependencies is crucial for managing supply chain risk.
Maintaining a Software Bill of Materials (SBOM) provides the necessary visibility into software components to respond effectively to supply chain threats.
To combat the rising tide of software supply chain attacks, organizations must adopt a proactive stance on managing their software dependencies. A critical first step is creating and maintaining a Software Bill of Materials (SBOM) for all critical applications. This provides a complete inventory of all third-party and open-source components, including their versions. This inventory must then be fed into a Software Composition Analysis (SCA) tool. The SCA tool should be integrated into the CI/CD pipeline to automatically scan for known vulnerabilities in these components during the build process. Builds that introduce high-severity vulnerabilities should be automatically failed, preventing vulnerable code from ever reaching production. This 'shift-left' approach to security allows organizations to identify and remediate supply chain risks before they can be exploited.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats