The Rise of Supply Chain Attacks in 2024 | What Research Says
In 2024, the world of cybersecurity faced a growing menace: supply chain attacks. These attacks, which exploit vulnerabilities in the interconnected web of suppliers, vendors, and software providers, have surged in frequency and impact. Unlike traditional cyberattacks that target a single organization, supply chain attacks ripple through entire ecosystems, affecting businesses, customers, and even critical infrastructure. Research from 2024 highlights how these attacks have become more sophisticated, targeting industries like healthcare, technology, and finance. This blog dives into the research findings, explores real-world examples, and offers practical steps to stay protected in this evolving threat landscape.

Table of Contents
- What Are Supply Chain Attacks?
- Why 2024 Saw a Surge in Supply Chain Attacks
- Key Supply Chain Attack Incidents in 2024
- Research Insights on Supply Chain Attacks
- How to Prevent Supply Chain Attacks
- Conclusion
- Frequently Asked Questions
What Are Supply Chain Attacks?
A supply chain attack is a cyberattack that targets an organization by exploiting weaknesses in its supply chain—third-party vendors, suppliers, or software providers that the organization relies on. Instead of directly attacking a company, hackers compromise a trusted partner, gaining access to the primary target’s systems or data. Think of it as sneaking through the back door of a house by tricking the delivery person into leaving it unlocked.
These attacks are particularly dangerous because they exploit trust. For example, a company might have robust security, but if a vendor’s software contains malicious code, that trust becomes a vulnerability. Supply chain attacks can affect hardware, software, or even services, making them a versatile and potent threat.
Why 2024 Saw a Surge in Supply Chain Attacks
Research in 2024 points to several reasons why supply chain attacks skyrocketed:
- Increased Digital Interconnectivity: Businesses rely heavily on third-party software and cloud services, creating more entry points for attackers.
- Sophisticated Attackers: Hackers have become more organized, using advanced techniques like backdoors in open-source software or phishing campaigns targeting employees.
- Growing Complexity: Global supply chains are intricate, involving multiple vendors and subcontractors, making it harder to secure every link.
- High Impact: A single attack can affect thousands of organizations, as seen in incidents like the SolarWinds attack of 2020, which set a precedent for 2024’s wave.
- Regulatory Gaps: While regulations like CISA’s SBOM (Software Bill of Materials) initiatives are emerging, many organizations still lack comprehensive supply chain security policies.
According to Cyble, supply chain attacks increased by 25% from February to September 2024, with an average of 16 attacks per month in the latter half of the year. This surge underscores the urgent need for better defenses.
https://cyble.com/blog/supply-chain-attacks-surge-in-april-may-2025
Key Supply Chain Attack Incidents in 2024
Let’s look at some of the most notable supply chain attacks of 2024, as documented by research, to understand their scale and impact.
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
https://www.kaspersky.com/blog/supply-chain-attacks-in-2024/52965
https://www.kaspersky.com/blog/supply-chain-attacks-in-2024/52965
Incident | Industry | Impact | Details |
---|---|---|---|
Change Healthcare Ransomware | Healthcare | 100 million records compromised | A ransomware attack disrupted patient care and exposed sensitive medical data, with a Risk Exposure Index score of 9.46. |
Cencora Breach | Pharmaceutical | Affected 27 companies | Exposed sensitive health data across multiple firms, highlighting vulnerabilities in interconnected supply chains. |
Synnovis Ransomware | Healthcare | 300 million patient interactions disrupted | A U.K. pathology lab attack delayed medical procedures, with a Risk Exposure Index score of 9.11. |
XZ Utils Backdoor | Technology | Potential Linux ecosystem breach | A malicious backdoor in open-source software was discovered before widespread damage, but it exposed Linux vulnerabilities. |
Polyfill.io Attack | Technology | 100,000+ websites affected | Malicious code in a JavaScript library impacted thousands of websites after the service was sold to a new owner. |
These incidents show how supply chain attacks can disrupt entire industries, from healthcare delivery to software ecosystems, with far-reaching consequences.
Research Insights on Supply Chain Attacks
Research from 2024 provides critical insights into the nature and impact of supply chain attacks:
- Scale of Impact: Statista reported that approximately 183,000 customers were affected by supply chain cyberattacks globally in 2024, a significant number but lower than the 2019 peak of 263 million.
- https://www.statista.com/statistics/1375129/supply-chain-attacks-customers-affected-global
- Software Supply Chain Risks: Sonatype’s 2024 State of the Software Supply Chain Report noted that attacks on open-source software doubled, with attackers targeting essential projects like XZ Utils. Poor dependency management remains a key vulnerability.
- https://www.sonatype.com/state-of-the-software-supply-chain/2024/10-year-look
- Human Error: The Ascension ransomware attack, triggered by an employee downloading a malicious file, underscores that human error causes 88% of data breaches, according to Stanford University research.
- https://prowritersins.com/cyber-insurance-blog/supply-chain-cyber-attacks-in-review
- Evolving Tactics: Check Point’s 2025 report highlighted a shift from email-based attacks (68% in 2024 vs. 84% in 2021) to web-based malware like FakeUpdates, which accounted for 40% of multipurpose malware.
- https://www.digit.fyi/cyber-attacks-on-the-tech-supply-chain-spiked-in-2024
- Industry Targets: Healthcare, IT, and telecom were hit hardest, with Cyble noting a 25% increase in attacks from October 2024 to May 2025.
- https://cyble.com/blog/supply-chain-attacks-surge-in-april-may-2025
These findings emphasize that supply chain attacks are not only growing but also becoming harder to detect and prevent due to their reliance on trusted relationships and complex systems.
How to Prevent Supply Chain Attacks
Protecting against supply chain attacks requires a proactive, multi-layered approach. Here are practical steps businesses can take:
- Vendor Risk Assessments: Regularly evaluate third-party vendors for security practices. Use tools like Cyberint’s Vendor Risk Score to identify weak links.
- https://cyberint.com/blog/research/recent-supply-chain-attacks-examined
- Software Bill of Materials (SBOM): Implement SBOMs to track software components and their origins, as recommended by CISA.
- https://www.securityweek.com/cyber-insights-2024-supply-chain
- Employee Training: Educate staff on phishing and social engineering tactics, which remain common attack vectors.
- https://aratum.com/perspective/emerging-threats-in-supply-chain-cybersecurity-in-2024
- End-to-End Encryption: Secure data exchanges with vendors using robust encryption and access controls, especially in industries like healthcare.
- https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
- Regular Audits: Conduct cybersecurity audits to identify vulnerabilities in IT systems and supply chain processes.
- https://www.wtagroup.com/resources-and-insights/blogs/10-supply-chain-risks-for-international-shippers-in-2025
- Incident Response Plan: Develop a clear plan to minimize damage and restore operations quickly after an attack.
- https://www.wtagroup.com/resources-and-insights/blogs/10-supply-chain-risks-for-international-shippers-in-2025)
By adopting these measures, businesses can reduce their exposure to supply chain risks and build resilience against future attacks.
Conclusion
The rise of supply chain attacks in 2024 marks a critical turning point in cybersecurity. Research shows that these attacks are growing in frequency, sophistication, and impact, targeting industries from healthcare to technology. High-profile incidents like the Change Healthcare and XZ Utils attacks reveal the devastating potential of exploiting trusted relationships. However, with proactive measures like vendor assessments, SBOMs, and employee training, businesses can strengthen their defenses. As supply chains become more digital and interconnected, staying vigilant and informed is essential to safeguarding data, operations, and trust in 2025 and beyond.
Frequently Asked Questions
What is a supply chain attack?
A supply chain attack is a cyberattack that targets an organization by exploiting vulnerabilities in its third-party vendors, suppliers, or software providers.
Why are supply chain attacks dangerous?
They exploit trusted relationships, allowing attackers to access multiple organizations through a single breach, amplifying the impact.
Which industries were most affected in 2024?
Healthcare, IT, and telecommunications were the hardest hit, according to research from Cyble and others.
https://cyble.com/blog/supply-chain-attacks-surge-in-april-may-2025
How many customers were affected by supply chain attacks in 2024?
Approximately 183,000 customers were impacted globally, per Statista.
https://www.statista.com/statistics/1375129/supply-chain-attacks-customers-affected-global
What was the Change Healthcare attack?
A ransomware attack that compromised 100 million records, disrupting healthcare services with a Risk Exposure Index score of 9.46.
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
What was the XZ Utils incident?
A backdoor in the XZ Utils open-source software threatened the Linux ecosystem but was caught before widespread damage.
https://www.kaspersky.com/blog/supply-chain-attacks-in-2024/52965
How do attackers exploit supply chains?
They use tactics like malicious code in software updates, phishing, or compromising vendor systems to gain access to primary targets.
What is a Software Bill of Materials (SBOM)?
An SBOM is a list of software components and their origins, helping organizations track and secure their software supply chain.
https://www.securityweek.com/cyber-insights-2024-supply-chain
Why did supply chain attacks increase in 2024?
Increased digital interconnectivity, sophisticated attackers, and complex supply chains created more vulnerabilities.
https://cyble.com/blog/supply-chain-attacks-surge-in-april-may-2025
How can businesses prevent supply chain attacks?
Conduct vendor risk assessments, use SBOMs, train employees, and implement encryption and audits.
https://cyberint.com/blog/research/recent-supply-chain-attacks-examined
https://www.securityweek.com/cyber-insights-2024-supply-chain
What role does human error play in these attacks?
Human error, like downloading malicious files, causes 88% of data breaches, as seen in the Ascension attack.
https://prowritersins.com/cyber-insurance-blog/supply-chain-cyber-attacks-in-review
What is the Risk Exposure Index?
An AI-developed score (1-10) used to assess the severity of data breaches, with higher scores indicating greater risk.
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
How did the Polyfill.io attack happen?
Malicious code was inserted into a JavaScript library after its sale to a new owner, affecting over 100,000 websites.
https://www.kaspersky.com/blog/supply-chain-attacks-in-2024/52965
Are open-source projects vulnerable?
Yes, attacks like XZ Utils show that open-source software is a prime target due to its widespread use.
https://www.sonatype.com/state-of-the-software-supply-chain/2024/10-year-look
What is phishing in supply chain attacks?
Phishing involves tricking employees into clicking malicious links or downloading infected files to gain access to systems.
https://aratum.com/perspective/emerging-threats-in-supply-chain-cybersecurity-in-2024
How do regulations help prevent attacks?
Regulations like CISA’s SBOM initiatives promote transparency and security in software supply chains.
https://www.securityweek.com/cyber-insights-2024-supply-chain
What was the Synnovis attack?
A ransomware attack on a U.K. pathology lab that disrupted 300 million patient interactions and delayed medical procedures.
https://www.scmr.com/article/analyzing-the-supply-chain-risks-behind-the-top-data-breaches-in-2024
Can small businesses be targeted?
Yes, small businesses are often targeted as weak links to access larger partners in the supply chain.
How do attackers use web-based protocols?
Web-based malware like FakeUpdates, which rose to 32% of attacks in 2024, disguises itself as software updates.
https://www.digit.fyi/cyber-attacks-on-the-tech-supply-chain-spiked-in-2024
What’s the cost of supply chain attacks?
Attacks like SolarWinds cost companies an average of 11% of annual revenue, with recovery costs in billions.
https://aratum.com/perspective/emerging-threats-in-supply-chain-cybersecurity-in-2024
What's Your Reaction?






