Cyberattacks on supply chains, known as supply chain hacking, target the vulnerabilities of third-party suppliers and partners. Hackers use targeted security vulnerabilities to gain access to critical data and systems. The consequences range from data theft to production downtime - with serious consequences in some cases. Recent cases from Switzerland and around the world show how urgently many companies need to act now to ward off these threats.
Supply chain hacking is not just a theoretical risk. These attacks are rapidly becoming one of the biggest cyber threats of our time. Cybersecurity Ventures predicts that the annual cost of such attacks worldwide will rise from USD 46 billion in 2023 to USD 60 billion in 2025 and up to USD 138 billion in 2031. Gartner also estimates that by 2025, almost 45 per cent of all companies worldwide will experience attacks on their software supply chains - a threefold increase since 2021. The reasons for this lie in the increasing networking between suppliers, partners and customers, which offers hackers ever new targets. Switzerland is not spared from this development either. An analysis of over 90 cyber insurance cases between 2016 and 2024 shows that 26 per cent of incidents are attributable to vulnerabilities in the IT supply chain or errors by outsourcing partners. These figures make it clear that companies must not only protect their own IT systems, but also keep an eye on those of their service providers and suppliers. The IT supply chain is increasingly becoming a risk factor that requires a rethink of the security strategy.
Supply chain hacking is based on the targeted exploitation of vulnerabilities within a company's supply chain. Instead of directly attacking a well-secured target, hackers choose to take a diversion via less protected partners or third-party providers, who often act as a weak point.
A hacker integrates malicious code into widely used software products such as VoIP applications, remote management tools or ERP systems. This software is then passed on to unsuspecting companies or made available as an update. Once installed, the malicious code opens the door for attackers to access sensitive data or enables espionage. A recent example of this is the attack on 3CX, in which the manipulated desktop version of the software compromised thousands of companies worldwide.
Hackers often target smaller service providers whose security precautions cannot keep up with the standards of large companies. These service providers often have direct access to their customers' IT systems or supply important components used in production. By attacking these ‘soft targets’, hackers can gain undetected access to the larger and better-secured main systems.
The consequences of a supply chain hack are often not limited to the company directly affected. If a supplier is infiltrated, its customers and partners may also be at risk. Stolen access data or prepared software updates could reach numerous other companies. This multiplies the damage and extends far beyond the actual target organisation. These indirect effects make supply chain hacking particularly devastating and difficult to contain.
To effectively counter the growing threat of supply chain hacking, you should rely on a comprehensive security concept. The following measures are essential:
With these measures, companies can significantly increase their resilience against supply chain hacking and sustainably strengthen the security of their IT infrastructure.
Supply chain hacking is an acute threat that is growing steadily with increasing interconnectedness and global supply chains. Swiss companies must expand their security measures to protect both their own networks and the entire supply chain. Proactive approaches such as zero-trust models and regular security assessments are now indispensable to ward off sophisticated attacks. Now is the time to take responsibility for the IT security of the entire value chain.
Supply chain hacking requires new approaches to IT security. In addition to your own network, the supply chain must also be protected. Preventive measures such as zero-trust models and security operation centers strengthen both the security and the trust of customers and partners. Strategic action today creates a secure basis for the future.
MTF supports companies in Switzerland with comprehensive security solutions that are specifically tailored to the needs of modern IT landscapes. Our experts help you identify risks, close vulnerabilities and develop a robust security strategy.
Let's secure your IT supply chain together. Contact us today to find out more about our customized solutions.