Software supply chains are proving easy pickings for cybercriminals

Supply Chain
(Image credit: Shutterstock.com / TMLsPhotoG)

Software supply chain attacks are proving to be a winning strategy for cybercriminals looking to compromise large organizations and wreak havoc across their IT infrastructure, new research has said.

A report from BlackBerry found the vast majority (74%) has companies had received a notification of an attack, or vulnerability, in their software supply chain in the last 12 months.

As risk grows, so do the enterprises’ efforts to mitigate it, the report further explained. More than half (54%) deployed data encryption, and a similar percentage (47%) is regularly training their staff on cybersecurity. Multi-factor authentication (MFA) has been deployed by 43% of the survey respondents.

Trojan horse

At the same time, the majority (68%) of IT leaders believe their software supplier’s cybersecurity policies are at least comparable, if not stronger than (31%) those they have implemented. Finally, nearly all (98%) of the respondents were confident in their suppliers’ ability to identify and prevent the exploitation of a vulnerability within their environment.  

A software supply chain attack turns a software supplier into an unwitting Trojan horse for the victim organization. Since most enterprises have tightened up on cybersecurity, it has gotten more difficult to break in. However, software suppliers might not have the same security measures, and thus could be easier to compromise. From there, hackers can infect the software with malicious code and open the doors to the kingdom from the inside.

Operating systems (32%) and web browsers (19%) continue to create the biggest impact for organizations, the report concludes. 

Organizations suffering a software supply chain attack feel the sting of financial loss (62%), data loss (59%), reputational damage (57%), and operational impact (55%). Almost two in five (38%) take up to a month to recover. 

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Security
Removing software supply chain blind spots that put public sector organizations at risk
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
A graphic showing someone on a tablet working through a supply chain.
How phishing attacks are hitting the supply chain – and how to fight back
Holographic representation of cloud computing over open businessman's hand
Businesses are struggling to address vulnerabilities hidden in phantom dependencies
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Google Pixel Watch 3
Google Pixel Watches hit with delayed notifications, crashing, and performance issues following Wear OS 5.1 update
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it