DerScanner > Blog > 11 Examples of Supply Chain Attacks
You don’t have to dig deep to find supply chain attack examples. They’re now one of the fastest-growing threats in cybersecurity. According to recent data, supply chain attacks have surged in frequency, even managing to breach highly secure environments that once seemed impenetrable.
It’s not surprising. Today’s organizations rely heavily on third-party software, open-source libraries, and outsourced hardware manufacturing. That interconnectedness speeds up development, but it also widens the attack surface. Each dependency becomes a potential doorway.
Attackers have figured this out. Rather than targeting an organization’s core infrastructure directly, they look for weaknesses in less-protected vendors or third-party tools. That might mean injecting malicious code into an open-source library, compromising a CI/CD pipeline, or altering firmware during manufacturing.
What makes them so effective is how legitimate they look. They exploit the same tools and pipelines your team depends on every day. By the time anyone notices, the damage is already done.
So, what is a supply chain attack? It’s when hackers infiltrate an organization through trusted third party vendors, which can be software vendors, a hardware supplier, or a managed service. These relationships often come with privileged access to critical systems.
In an open source supply chain attack, attackers insert malicious code into a widely used package, something that seems harmless, like a utility library or plugin, and then wait. Once a developer unknowingly integrates that code into their product, the malware spreads silently across systems and customers. The Mavengate incident is a textbook case where a small compromise in a dependency turned into a full-scale cyber attack on the supply chain.
The 3CX desktop app supply chain attack is another example. A trusted app used by businesses worldwide was compromised through upstream tampering. These attacks didn’t exploit zero-days. They exploited trust and the complexity of modern software pipelines.
The problem is scale. A single compromised library or a third party service can expose dozens or hundreds of downstream organizations. And in today’s environment of continuous integration and fast-paced delivery, that risk compounds fast.
So, what can be done? Effective supply chain attack prevention starts with visibility. You need to know what’s running in your environment, where it came from, and who maintains it. Just as importantly, app security testing is absolutely essential, not just at the point of release, but throughout the development lifecycle.
Not all supply chain cyber attacks look the same, and that’s what makes them so dangerous. These attacks exploit the very structure of modern software development, where teams build on top of shared codebases, third-party services, and hardware sourced from global vendors.
So, what are the main types of supply chain attacks, and how do they work in practice?
This is one of the most common attack techniques in cyber security today. Developers lean heavily on external libraries and frameworks to save time and avoid reinventing the wheel. But when attackers inject malicious code into a trusted dependency, it’s like slipping a trojan into the assembly line.
A notorious example is the event-stream incident, where a popular npm package was modified to siphon off Bitcoin wallet details. Because the injected code was hidden deep inside a nested dependency, many developers never saw it coming.
To defend against this, teams need proper dependency scanning, version control, and clear policies on which packages are approved. Automated app security testing tools can help flag risky components before they ship.
Package hijacking is a supply chain attack example where attackers take over a legitimate developer’s account and push a tainted version of a popular library to a public repository like npm or PyPI.
In the case of the ctx Python package, a new version was quietly published with a backdoor. And developers who updated automatically pulled it into their systems.
Prevention here is part technical hygiene, part process. Enforce two-factor authentication for contributors. Vet package authors. And maintain internal mirrors or hash verification for critical packages.
Typosquatting is one of the more deceptive forms of software supply chain attack. It works by taking advantage of human error. For example, when developers mistype the name of a popular package.
Attackers register these near-identical names and upload compromised software laced with malware. Since package managers like npm and PyPI don’t always verify intent, the malicious code can be downloaded and deployed automatically.
To use open-source with confidence, teams need to establish clear safeguards. Developers should rely on validated dependency lists and carefully check package names before importing. Security tools like DerScanner Software Composition Analysis can also flag risky components, catching issues before they lead to data breaches.
In this attack, malicious actors inject malicious code into a legitimate software product, often by compromising a contributor account or using insider access. Once the software is published, the code executes silently in user environments.
Defending against this requires rigorous build verification, secure contributor practices, and ongoing monitoring after each software update. You can’t assume a product is safe just because it passed QA once; continuous validation is key.
Supply chain attacks target the systems that power modern software development, and the CI/CD pipeline is a prime example. Here, attackers gain access to infrastructure used for automated builds and deployments. In the CircleCI breach, attackers stole environment variables, including tokens and secrets, potentially exposing sensitive data.
The attack was platform-specific and exploited Java vulnerabilities in components during the assembly stage. Vulnerable Java libraries, especially when outdated or misconfigured, can open doors that attackers are quick to exploit.
To reduce this risk, teams should limit access to CI/CD systems, isolate credentials, and use tools like Static Application Security Testing SAST and DAST to detect vulnerabilities early in the process.
While most supply chain incidents involve software, the risk to hardware is just as real. In a hardware supply chain attack, attackers compromise physical components like microchips or firmware before they ever arrive at your network.
One cyber attack on supply chain that drew global attention was the alleged Supermicro spy chip case. Though never fully confirmed, it raised urgent questions about just how vulnerable the manufacturing and delivery process can be.
Dependency confusion occurs when attackers publish a malicious package with the same name as an internal package in a public repository. For example, Alex Berson uploaded duplicate internal packages to PyPI and npm, tricking developers into using the malicious public version. Such a supply chain attack results in attackers gaining access to internal systems by exploiting naming conflicts between private and public dependencies.
To prevent supply chain attacks, organizations should isolate their private repositories from public ones and implement strict guidelines for package source validation.
A third-party vendor breach happens when an outside partner becomes the point of entry. Once attackers compromise the vendor, they can move laterally into the connected organization’s systems.
One well-known example is the Codecov breach. A flaw in Codecov’s source code allowed an attacker to collect sensitive credentials from users of its continuous integration platform. It’s a reminder that forms of supply chain attacks don’t always start with your own systems.
As security measures to reduce this risk, organizations should run in-depth vendor risk assessments and keep external access credentials on a strict need-to-know basis.
Sometimes, attackers don’t break in; they’re invited in, under false pretenses. One of the most dangerous forms of supply chain attacks is the use of fake software updates. These updates look legitimate, often carrying trusted brand names, but they install malware instead.
One of the famous supply chain attacks in this category is the Flame malware incident. Attackers managed to spoof a Microsoft update by using a stolen digital certificate. Because the update appeared valid, it bypassed basic checks and infected systems silently.
Prevention starts with strict controls. Organizations should verify that updates are digitally signed, distributed over secure HTTPS connections, and match known hashes.
Cyber security supply chain attacks at the hardware level are harder to detect and nearly impossible to fix once inside. The only real defense is prevention: source hardware from trusted suppliers, audit everything upon delivery, and maintain tight security standards throughout procurement.
10. Signed malware
In signed malware attacks, hackers sign their malware to make it look authentic by using stolen certificates. Malware in the Stuxnet attack was able to evade anti-malware software because it was signed with a legitimate Realtek digital certificate.
To protect against supply chain cyberattacks for signed malware, organizations need to verify the certificate reputation, render stolen certificates useless, and implement strong application security testing solutions like SAST for Scala.
Finally, supply chain insider threats consist of contractors or staff who introduce vulnerabilities or malicious code into the system. A suitable example is the Ubiquiti hack, in which an insider demanded a ransom for private information that was stolen.
Protection against software supply chain attacks by insiders includes comprehensive contractor screening, real-time monitoring of activity, and strict access control. Separating access permissions and closely monitoring the activity of workers and contractors will help to restrict insider threats.
Recent software supply chain attacks have shown the increasing risks in important systems. Several major incidents have revealed the dangers of depending on third-party providers for software and services. Let's go into detail on some supply chain attacks that happened recently.
The SolarWinds supply chain attack, a worldwide software supply chain attack, is still regarded as one of the biggest supply chain attacks to date. SolarWinds attackers managed to access the Orion update platform, which is commonly used by government organizations. Hackers were able to remotely access thousands of important servers after malicious code was introduced into the system updates.
Attackers went after Kaseya in another well-known supply chain cyberattack by breaching the VSA software. The attackers managed to impact thousands of users by inserting the REvil ransomware into a software update. It's one of the common cyber attack techniques used to exploit trusted software channels.
Due to the enormous inconvenience caused by this, $70 million in ransom demands were made. This attack shows the extent to which ransomware can disrupt supply chain operations. It also stresses the need for cyber attack prevention techniques to reduce such risks.
In 2021, Atlassian became the target of a supply chain cyber attack that exposed a key vulnerability in its SSO system. Attackers were able to exploit an SSO token to gain unauthorized access to multiple connected applications. This affected thousands of users across organizations that depended on Atlassian’s platform. Atlassian's breach showed how important it is to improve authentication systems and keep security protocols strong.
In a classic dependency abuse scenario, security researcher Alex Birsan demonstrated how an attacker could inject harmful packages into commonly used dependencies used by some popular companies.
By using fake dependencies and delivering them to end-users, he demonstrated how attackers can infiltrate supply chains in the software development life cycle. This attack is a classic type of open-source supply chain attack, where an attacker uses dependency systems to spread malicious code.
Mimecast, a provider of email security services, suffered a breach in 2021 when attackers stole a certificate used to authenticate connections between Mimecast and Microsoft 365 Exchange Web Services. With that access, hackers were able to intercept and read sensitive communication data. Around 10% of Mimecast’s customers were affected. This attack highlighted how infrastructure-level trust can become a target in a supply chain cyber attack and how difficult it can be to detect supply chain attack when attackers exploit trusted relationships.
Preventing supply chain attacks in real time means catching them as they happen, not just reacting after they’ve occurred.
One of the most effective approaches is to use tools that monitor software behavior in production. Runtime protection solutions help detect suspicious activity the moment it appears. This kind of real-time response gives security teams a window to act before the attack escalates or spreads.
When paired with a complete application security testing solution, these tools can also flag issues tied to compromised software and provide early warnings during active use. This is especially critical for catching high-impact threats like Java security vulnerabilities, where even a small misstep can lead to serious data breaches or leaks of customer data.
Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) tools play a critical role here as well. These systems monitor devices across the network, making it easier to spot lateral movement or other signs of intrusion. If a Java vulnerability or an unknown binary starts behaving abnormally, teams can act fast to contain the threat.
Another smart move is monitoring your Software Bill of Materials (SBOM). By keeping track of exactly what’s inside your application, you’re better equipped to respond when a software update introduces risk.
Attackers are getting smarter. They’re finding new ways to break into systems by targeting weak links across both digital and physical supply chains. The range of tactics is expanding, from injecting malicious code into widely used open source components.
Tools like the Delphi code security solution are becoming increasingly important in defending against software supply chain attacks. They help identify and fix vulnerabilities that could otherwise go unnoticed. It’s not just about stopping attacks. It’s about improving code quality from the ground up, so there’s less room for attackers to move.
Security frameworks such as NIST and ISO also play a key role in cyber attack prevention techniques. They provide clear guidance on how to manage risk, respond to incidents, and reduce exposure to the growing threat of a software supply chain attack.
Collaboration is another piece of the puzzle. It calls for better coordination between vendors, developers, and governments. That includes sharing threat intelligence and vetting third-party providers more carefully.
A software supply chain attack breaks more than just code; it breaks trust. As we’ve seen in real-world examples, a single piece of compromised software can lead to data breaches, service outages, and long-term damage to a business.
The path forward means putting stronger defenses in place. For example, you need to improve code quality, keep vendor risks in check, and invest in tools that surface issues before they spread.
The threats may be growing, but so are the ways to stop them. The key is to stay vigilant and not wait for an attack to start fixing what’s broken.