Software Supply Chain Attacks Skyrocket, Hitting Record High

Software Supply Chain Attacks Surge by 30% to Record High in October 2025

HIGH
November 8, 2025
4m read
Supply Chain AttackThreat IntelligenceRansomware

Related Entities

Organizations

Full Report

Executive Summary

New analysis reveals an alarming surge in software supply chain attacks, which reached a record high in late 2025. October 2025 saw 41 documented incidents, a figure over 30% higher than the previous peak in April 2025. This escalating threat is primarily driven by an increase in ransomware campaigns targeting third-party vendors and the exploitation of vulnerabilities in widely used software components. The most heavily impacted sectors include information technology, finance, manufacturing, and healthcare. The growing severity of this threat vector has been recognized by OWASP, which introduced a new category, 'Software Supply Chain Failures,' in its 2025 Top 10. The data suggests a dangerous disconnect, with 92% of organizations trusting their suppliers' security practices, while nearly half of all businesses still experienced a breach in the last year.


Threat Overview

The trend of increasing software supply chain attacks highlights a strategic shift by threat actors. Instead of attacking hardened targets directly, they are compromising their less secure suppliers to gain trusted access. The information technology sector is the primary target, with nearly 120 attacks recorded recently, as compromising a single Managed Service Provider (MSP) or software vendor can provide access to hundreds or thousands of downstream victims.

Key drivers of this trend include:

  • Ransomware Groups: Actors like CL0P have specialized in exploiting vulnerabilities in third-party software to execute massive, multi-victim campaigns.
  • Third-Party Dependencies: The reliance on open-source libraries and third-party packages means a single vulnerability in a popular component can create systemic risk across thousands of applications.
  • Overconfidence in Suppliers: A misplaced sense of trust is exacerbating the problem. Research shows that while 92% of organizations trust their suppliers, only 66% conduct thorough risk assessments, creating significant blind spots.

This trend represents a Supply Chain Compromise (T1195) on a macro scale, where the entire software ecosystem is being targeted.


Technical Analysis

Attackers are employing several methods to execute software supply chain attacks:

  1. Compromise of Software Development Tools: Attackers breach the infrastructure of a software vendor (e.g., build servers, code repositories) to inject malicious code into legitimate software updates. This is a form of Compromise Software Dependencies and Development Tools (T1195.002).
  2. Exploitation of Third-Party Software: Threat actors find and exploit zero-day or N-day vulnerabilities in widely used enterprise or open-source software to breach multiple organizations at once (e.g., the MOVEit and Oracle EBS campaigns by CL0P).
  3. Compromise of Open-Source Repositories: Attackers upload malicious packages to public repositories like npm or PyPI, using techniques like typosquatting to trick developers into including them in their projects.

These methods exploit the Trusted Relationship (T1199) between a business and its software suppliers or between a developer and a software library.


Impact Assessment

Software supply chain attacks have a disproportionately large impact, creating systemic risk for entire industries and economies. A single attack can lead to thousands of downstream breaches, as seen in the SolarWinds incident. The financial and reputational damage is immense, not only for the initial vendor but for every organization compromised as a result. This trend forces a paradigm shift in security, moving from a focus solely on perimeter defense to a more comprehensive approach that includes rigorous vendor risk management, software composition analysis, and a Zero Trust mindset toward all third-party code and services.


Detection & Response

  • Software Bill of Materials (SBOM): Maintain a detailed SBOM for all critical applications to understand all third-party components and dependencies. This allows for rapid identification of affected assets when a new vulnerability is disclosed.
  • Behavioral Monitoring: Monitor for anomalous behavior from trusted software and third-party connections. For example, a legitimate software update process should not be spawning powershell.exe or making connections to unknown domains.
  • Code Scanning: Integrate static (SAST) and dynamic (DAST) application security testing, along with software composition analysis (SCA) tools, into the development pipeline to identify vulnerable dependencies before they are deployed.

Mitigation

  • Third-Party Risk Management: Implement a robust vendor risk management program. This must go beyond questionnaires and include technical assessments, contractual security requirements, and rights to audit.
  • Code Signing (M1045 - Code Signing): Enforce strict code signing policies to ensure the integrity of software updates and internal applications. Only allow executables signed by trusted publishers to run.
  • Principle of Least Privilege: Third-party software and integrations should be granted the absolute minimum level of access and permissions required for them to function. This can contain the damage if the software is compromised.
  • Vulnerability Management (M1016 - Vulnerability Scanning): Continuously scan for vulnerabilities not just in your own code, but in all the third-party libraries and components you use. Prioritize patching based on exploitability and asset criticality.

Timeline of Events

1
April 1, 2025
The previous peak for software supply chain attacks was recorded.
2
October 1, 2025
A new record of 41 software supply chain attacks was set, a 30% increase over the previous peak.
3
November 8, 2025
This article was published

MITRE ATT&CK Mitigations

Enforcing code signing ensures the integrity of software updates and prevents the execution of tampered binaries.

Mapped D3FEND Techniques:

Using Software Composition Analysis (SCA) tools to continuously scan for vulnerabilities in third-party dependencies is crucial for managing supply chain risk.

Maintaining a Software Bill of Materials (SBOM) provides the necessary visibility into software components to respond effectively to supply chain threats.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat the rising tide of software supply chain attacks, organizations must adopt a proactive stance on managing their software dependencies. A critical first step is creating and maintaining a Software Bill of Materials (SBOM) for all critical applications. This provides a complete inventory of all third-party and open-source components, including their versions. This inventory must then be fed into a Software Composition Analysis (SCA) tool. The SCA tool should be integrated into the CI/CD pipeline to automatically scan for known vulnerabilities in these components during the build process. Builds that introduce high-severity vulnerabilities should be automatically failed, preventing vulnerable code from ever reaching production. This 'shift-left' approach to security allows organizations to identify and remediate supply chain risks before they can be exploited.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain SecurityThird-Party RiskOWASPRansomwareThreat Landscape

📢 Share This Article

Help others stay informed about cybersecurity threats