The invisible threat: Cyberattacks on supply chains 

Cyberattacks on supply chains, known as supply chain hacking, target the vulnerabilities of third-party suppliers and partners. Hackers use targeted security vulnerabilities to gain access to critical data and systems. The consequences range from data theft to production downtime - with serious consequences in some cases. Recent cases from Switzerland and around the world show how urgently many companies need to act now to ward off these threats.

Supply chain hacking is not just a theoretical risk. These attacks are rapidly becoming one of the biggest cyber threats of our time. Cybersecurity Ventures predicts that the annual cost of such attacks worldwide will rise from USD 46 billion in 2023 to USD 60 billion in 2025 and up to USD 138 billion in 2031. Gartner also estimates that by 2025, almost 45 per cent of all companies worldwide will experience attacks on their software supply chains - a threefold increase since 2021. The reasons for this lie in the increasing networking between suppliers, partners and customers, which offers hackers ever new targets. Switzerland is not spared from this development either. An analysis of over 90 cyber insurance cases between 2016 and 2024 shows that 26 per cent of incidents are attributable to vulnerabilities in the IT supply chain or errors by outsourcing partners. These figures make it clear that companies must not only protect their own IT systems, but also keep an eye on those of their service providers and suppliers. The IT supply chain is increasingly becoming a risk factor that requires a rethink of the security strategy.

How does supply chain hacking work?

Supply chain hacking is based on the targeted exploitation of vulnerabilities within a company's supply chain. Instead of directly attacking a well-secured target, hackers choose to take a diversion via less protected partners or third-party providers, who often act as a weak point. 

What might supply chain hacking look like?

A hacker integrates malicious code into widely used software products such as VoIP applications, remote management tools or ERP systems. This software is then passed on to unsuspecting companies or made available as an update. Once installed, the malicious code opens the door for attackers to access sensitive data or enables espionage. A recent example of this is the attack on 3CX, in which the manipulated desktop version of the software compromised thousands of companies worldwide.

Attacking vulnerabilities in the supply chain

Hackers often target smaller service providers whose security precautions cannot keep up with the standards of large companies. These service providers often have direct access to their customers' IT systems or supply important components used in production. By attacking these ‘soft targets’, hackers can gain undetected access to the larger and better-secured main systems.

Indirect effects

The consequences of a supply chain hack are often not limited to the company directly affected. If a supplier is infiltrated, its customers and partners may also be at risk. Stolen access data or prepared software updates could reach numerous other companies. This multiplies the damage and extends far beyond the actual target organisation. These indirect effects make supply chain hacking particularly devastating and difficult to contain.

Current examples of supply chain Attacks in Switzerland 

  • Swiss Post (April 2024):
    An attack on third-party providers gave hackers unauthorised access to sensitive Swiss Post data.
     
  • IT suppliers to the Confederation (Xplain and Concevis):
    Attacks on these important IT partners of the federal authorities revealed serious weaknesses in the IT security infrastructure.
     
  • OneLog platform (October 2024):
    The login platform used by over 40 media portals fell victim to a cyberattack, resulting in many readers being unable to access their accounts.
     
  • 3CX (February 2023):
    Manipulated versions of the VoIP software enabled hackers to record conversations and collect sensitive data.

How to protect your company from supply chain hacking 

To effectively counter the growing threat of supply chain hacking, you should rely on a comprehensive security concept. The following measures are essential:

  1. IT asset management and effective patch management
    • Create a system overview: With IT asset management software (ITSAM), you can easily identify and monitor all installed applications, such as AnyDesk.
    • Install regular updates: Security gaps can be closed through continuous software updates. A current example is updating to AnyDesk version 7.0.15 or higher to eliminate known vulnerabilities.
       
  2. Implement zero-trust strategies
    The zero-trust model considers all access as potentially unsafe. Every request - regardless of its origin - is verified. This principle significantly minimizes security risks and offers a modern approach to IT security.
     
  3. Supplier evaluation and risk management
    • Regular security audits: Suppliers' cybersecurity standards should be continuously checked and evaluated.
    • Preparation for the NIS2 Directive: Companies should prepare early for the EU regulations that will apply from 2024. These affect not only "essential facilities", but also their suppliers.
       
  4. Use a Security Operation Center (SoC)
    A Security Operation Center monitors IT systems around the clock and detects threats in real time. By using modern XDR (Extended Detection and Response) technologies, attacks can be detected early and effectively contained.
     
  5. Raise awareness and train employees
    Employee training is one of the best lines of defense against cyber attacks. Regular training helps to identify phishing attempts and other attack vectors early and act accordingly.

With these measures, companies can significantly increase their resilience against supply chain hacking and sustainably strengthen the security of their IT infrastructure.

UNDERSTANDING SUPPLY CHAIN ​​HACKING CREATING PROTECTION FOR THE FUTURE 

Supply chain hacking is an acute threat that is growing steadily with increasing interconnectedness and global supply chains. Swiss companies must expand their security measures to protect both their own networks and the entire supply chain. Proactive approaches such as zero-trust models and regular security assessments are now indispensable to ward off sophisticated attacks. Now is the time to take responsibility for the IT security of the entire value chain.

MTF: YOUR PARTNER FOR CYBER SECURITY 

Supply chain hacking requires new approaches to IT security. In addition to your own network, the supply chain must also be protected. Preventive measures such as zero-trust models and security operation centers strengthen both the security and the trust of customers and partners. Strategic action today creates a secure basis for the future.

MTF supports companies in Switzerland with comprehensive security solutions that are specifically tailored to the needs of modern IT landscapes. Our experts help you identify risks, close vulnerabilities and develop a robust security strategy.

Let's secure your IT supply chain together. Contact us today to find out more about our customized solutions.

FAQs 

  1. What is supply chain hacking?
    Supply chain hacking refers to cyber attacks in which hackers specifically exploit vulnerabilities in a company's supply chain to gain unauthorized access to data, systems or critical infrastructure.
     
  2. Why are supply chains an attractive target for hackers?
    Supply chains consist of many third-party suppliers who often do not have the same high security standards as large companies. Hackers use these "weaker links" to indirectly gain access to larger, better secured networks.
     
  3. Which companies are particularly at risk from supply chain hacking?
    In principle, all companies that rely on external software, IT service providers or suppliers are affected. Industries with complex supply chains, such as the automotive, technology and healthcare industries, are particularly at risk.
     
  4. What are some well-known examples of supply chain attacks?
    A prominent example is the 3CX attack (2023), in which manipulated software versions infected companies worldwide. The attack on the OneLog platform (2024) also shows how broad the impact of such attacks can be.
     
  5. How does a typical supply chain hack work?
    For example, hackers can integrate malicious code into a third-party software update. As soon as customers install the update, their system is infected and cyber criminals have back doors open for espionage or data theft.
     
  6. What are the consequences of a successful attack?
    The consequences range from data loss, industrial espionage and operational downtime to financial damage and loss of reputation. Companies can also be held liable for data breaches.
     
  7. How can companies protect themselves from supply chain hacking?
    Measures such as zero-trust models, regular security audits, comprehensive patch management and the use of a Security Operation Centers (SOC) can significantly reduce risk.
     
  8. What is the Zero Trust model?
    With the Zero Trust approach, all access is viewed as potentially unsafe. All users and systems must continuously authenticate themselves in order to access data or networks.
     
  9. What role do legal regulations such as the NIS2 Directive play?
    The EU's NIS2 Directive, which comes into force in 2024, requires companies to introduce stricter security measures for their IT infrastructure and supply chains. Swiss companies with EU ties should also prepare for this.
     
  10. What can SMEs specifically do to secure their supply chains?
    Small and medium-sized enterprises (SMEs) should regularly check their IT service providers for security standards, set up backups, train their employees and use multi-factor authentication (MFA) to access sensitive systems.

Also interesting 

Do you have Questions ?

Ümit Celebi
Key Account Manager