IT and software supply chain incidents have been trending higher in recent months, as threat actors have become more adept at exploiting the interconnected hardware, software, and services that comprise modern IT environments.
An analysis of Cyble data reveals that software supply chain attacks have increased from an average of just under 13 a month during the eight months of February-September 2024 to just over 16 a month from October 2024 to May 2025, an increase of 25% in the most recent eight-month period. The last two months have averaged nearly 25 cyberattacks with supply chain impact, representing a near-doubling of supply chain attacks if the recent trend continues (chart below).
However, monthly variations in supply chain attacks tend to be quite large, ranging from a low of 6 attacks in January 2025 to a high of 31 attacks in April 2025. So, some variability should be expected even as supply chain attacks generally trend higher.
The data for this article, from Cyble investigations and OSINT sources, is incomplete, as not every cyberattack or its source is always known.
An analysis of software supply chain attack trends follows, including targeted industries and countries, a closer look at 10 significant incidents, and steps organizations can take to protect themselves from supply chain threats.
Looking at the 79 cyberattacks with supply chain implications documented by Cyble in the first five months of 2025, the majority (50, or 63%) directly targeted IT, technology, and telecommunications companies, which are rich potential targets for threat actors hoping to exploit downstream users.
Damage from a successful exploit in those areas can be widespread, as happened with the hundreds of CL0P ransomware victims from a single vulnerability.
Supply chain attacks hit 22 of the 24 sectors tracked by Cyble in the first five months of 2025 (chart below). Only the Mining and Real Estate industries remained untouched.
Within non-tech industries, supply chain attacks often stem from third parties and service providers, including industry-specific solutions.
Among targeted countries, the U.S. was a target in 31 of the 79 incidents. European countries were targeted in 27 incidents, with France (10 incidents) experiencing the highest number of European attacks.
26 of the incidents targeted APAC countries, led by India (9 incidents) and Taiwan (4). The Middle East and Africa were targets in 10 incidents, including four each in the UAE and Israel.
Here are details of 10 supply chain incidents documented by Cyble in recent months. This week’s ransomware blog also listed an additional eight incidents with supply chain implications.
Protecting against software supply chain attacks is challenging because these partners and suppliers are, by nature, trusted, so organizations should build in controls and resilience wherever possible to limit the extent of any attacks. Such controls include:
The most effective place to control software supply chain risks is in the continuous integration and development (CI/CD) process, so carefully vetting partners and suppliers and requiring good security controls in contracts are essential ways to improve third-party security. Services like Cyble’s third-party risk intelligence can help you get started on this process. By making security a buying criterion, vendors will be more likely to respond with better security controls and documentation.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.