A supply chain attack is a type of cyberattack in which threat actors target less secure elements within an organization’s supply chain, typically by compromising a trusted third-party vendor, supplier, or service provider that has access to the organization’s systems or data. The attacker exploits the trust relationship between the target and its suppliers, often inserting malicious code or hardware during manufacturing, software development, or distribution processes.

There are two main types:
• Software supply chain attacks: Attackers inject malicious code into software or updates distributed by a trusted vendor. When organizations or individuals install the compromised software, attackers gain access to their systems. A notable example is the SolarWinds attack, where malware was distributed to thousands of customers through a legitimate software update.
• Hardware supply chain attacks: Attackers tamper with physical components, such as adding spying devices or malware during manufacturing or distribution, to compromise systems once the hardware is deployed.

Supply chain attacks are particularly dangerous because they can bypass robust security measures by exploiting trusted relationships, and a single compromised vendor can lead to widespread impact across many organizations.