Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      The Core Model: Start FROM The Answer, Not WITH The Solution

      July 31, 2025

      AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks, Veracode Research Reveals   

      July 31, 2025

      Understanding the code modernization conundrum

      July 31, 2025

      Not just YouTube: Google is using AI to guess your age based on your activity – everywhere

      July 31, 2025

      Malicious extensions can use ChatGPT to steal your personal data – here’s how

      July 31, 2025

      What Zuckerberg’s ‘personal superintelligence’ sales pitch leaves out

      July 31, 2025

      This handy NordVPN tool flags scam calls on Android – even before you answer

      July 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Route Optimization through Laravel’s Shallow Resource Architecture

      July 31, 2025
      Recent

      Route Optimization through Laravel’s Shallow Resource Architecture

      July 31, 2025

      This Week in Laravel: Laracon News, Free Laravel Idea, and Claude Code Course

      July 31, 2025

      Everything We Know About Pest 4

      July 31, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.31: Kernel 6.16, OpenMandriva Review, Conky Customization, System Monitoring and More

      July 31, 2025
      Recent

      FOSS Weekly #25.31: Kernel 6.16, OpenMandriva Review, Conky Customization, System Monitoring and More

      July 31, 2025

      Windows 11’s MSN Widgets board now opens in default browser, such as Chrome (EU only)

      July 31, 2025

      Microsoft’s new “move to Windows 11” campaign implies buying OneDrive paid plan

      July 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Software Supply Chain Attacks Have Surged in Recent Months

    Software Supply Chain Attacks Have Surged in Recent Months

    June 10, 2025

    software supply chain attacks 2025

    IT and software supply chain attacks have surged in recent months, as threat actors have gotten better at exploiting supply chain vulnerabilities, Cyble threat intelligence researchers reported this week.

    In a June 9 blog post, Cyble researchers said software supply chain attacks have grown from just under 13 a month during February-September 2024 to just over 16 a month from October 2024 to May 2025, an increase of 25%. However, the last two months have seen an average of nearly 25 cyberattacks with supply chain impact, a near-doubling of supply chain attacks from the year-ago period (chart below).

    software supply chain attacks by month 2025
    Software supply chain attacks by month 2024-2025 (Cyble)

    The researchers noted that because of the sophisticated nature of supply chain attacks, monthly variations can be quite large “so some variability should be expected even as supply chain attacks generally trend higher.”

    They also noted that not every cyberattack or its source is known, so such data “is by its nature incomplete.”

    Software Supply Chain Attacks: IT Targeted

    The researchers looked specifically at 79 supply chain attacks in the first five months of 2025. Of those, 50, or 63%, directly targeted IT, technology, and telecom companies, which are valuable targets for threat actors looking to exploit downstream users.

    “Damage from a single successful exploit in those areas can be widespread, as happened with the hundreds of CL0P ransomware victims from a single vulnerability,” Cyble said. Those CL0P victims helped make February a record month for ransomware attacks.

    Of 24 industries tracked by Cyble, only two sectors – Mining and Real Estate – were untouched by supply chain attacks in the first five months of 2025 (image below).

    software supply chain attacks by sector

    In non-tech industries, supply chain attacks often come via third parties, service providers, and industry-specific solutions.

    The U.S. was targeted in 31 of the 79 incidents. European countries were targeted in 27, with France (10 incidents) leading other European countries by a significant margin.

    26 incidents targeted APAC countries, led by India (9) and Taiwan (4). The Middle East and Africa were targeted in 10 supply chain attacks, with the UAE and Israel leading with four incidents each.

    Supply Chain Attack Examples

    Cyble detailed 10 of the supply chain attacks to show the range of industries and data exposed. Targets included:

    • A ransomware attack on a Swiss banking technology solutions and services company that included exfiltrated login credentials for banking applications.
    • An IT services subsidiary of a large international conglomerate was hit by a ransomware attack that may have “impacted multiple projects tied to government entities.”
    • A threat actor on the cybercrime forum DarkForums was selling “a large dataset allegedly pertaining to a high-throughput telecommunications satellite for Indonesia and some ASEAN countries.” The data allegedly included technical documents related to propulsion tests, launch analyses, ground systems, and site vulnerabilities.
    • Blueprints were allegedly among the stolen data in a Hellcat ransomware group attack on a China-based company specializing in display technologies and electronic solutions.
    • The DragonForce extortion group claimed to have stolen 200 GB of data from a U.S. company specializing in biometric recognition and identity authentication solutions.
    • The VanHelsing ransomware group claimed an attack on a U.S.-based company specializing in enterprise security and identity access management (IAM) solutions. “The nature of the exposed files suggests they may contain sensitive information linked to the company’s customers, potentially affecting sectors such as Banking, Financial Services, and Insurance (BFSI),” Cyble said.
    • A threat actor on the cybercrime forum Exploit was selling “unauthorized access with administrative privileges” to the cloud infrastructure of an Indian fintech company that offers SaaS-based payment service solutions.
    • A cyberattack on a Singapore-based technology company allegedly led to the theft of 3TB of data, including database content and technical and project documentation.
    • An attack on an Australian IT and telecom solutions company may have exposed licensing and application configuration files, hashed credentials, and other critical data.
    • A threat actor on DarkForums was selling unauthorized access to a portal belonging to an Australian telecommunications company that allegedly included access to domain administration tools and other critical network information.

    Protecting Against Supply Chain Attacks

    The researchers noted that protecting against supply chain attacks “is challenging because these partners and suppliers are, by nature, trusted.”

    Building in controls and resilience should be priorities, including:

    • network microsegmentation
    • strong access controls
    • encryption of data at rest and in transit
    • ransomware-resistant backups
    • honeypots for early breach detection
    • proper configuration of API and cloud service connections
    • monitoring for unusual activity

    “The most effective place to control software supply chain risks is in the continuous integration and development (CI/CD) process, so carefully vetting partners and suppliers and requiring good security controls in contracts are important ways to improve third-party security,” Cyble said.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat Is Managed WordPress Hosting?
    Next Article FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

    Related Posts

    Development

    Route Optimization through Laravel’s Shallow Resource Architecture

    July 31, 2025
    Development

    This Week in Laravel: Laracon News, Free Laravel Idea, and Claude Code Course

    July 31, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-40775 – BIND DNS Invalid TSIG Algorithm Field Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-31324 (CVSS 10): Zero-Day in SAP NetWeaver Exploited in the Wild to Deploy Webshells and C2 Frameworks

    Security

    CVE-2025-47736 – SQLite3 Parser Invalid UTF-8 Input Crash

    Common Vulnerabilities and Exposures (CVEs)

    When Google Wallet and PayPal break up, what’s your next move?

    News & Updates

    Highlights

    CVE-2025-29287 – MCMS Ueditor Unrestricted File Upload Vulnerability

    April 21, 2025

    CVE ID : CVE-2025-29287

    Published : April 21, 2025, 3:15 p.m. | 3 hours, 47 minutes ago

    Description : An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file.

    Severity: 9.8 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Verify Nested Relations Efficiently with Laravel’s Enhanced relationLoaded Method

    May 30, 2025

    CVE-2025-5859 – PHPGurukul Nipah Virus Testing Management System SQL Injection Vulnerability

    June 9, 2025

    CVE-2025-5649 – SourceCodester Student Result Management System Remote Access Control Bypass

    June 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.