Skip to main content

Supply Chain Attacks Explained

Instead of attacking you directly, sophisticated attackers compromise trusted software you already use. Here's how supply chain attacks work and how to defend against them.

Sarah Chen — Lead Security Editor
Sarah Chen·CISSPCompTIA Security+·Lead Security Editor
Updated
Protect yourself

Our Top 4 VPN Picks

Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.

EDITOR'S PICK
NordVPN logo
Best Overall
NordVPN
4.8/ 5

Fastest speeds, audited no-logs, 6000+ servers

Audited no-logs policyThreat Protection blocks malware10 devices per account30-day money-back guarantee
Save 74%
was $12.99/mo
$3.39/mo
Get NordVPN
30-day money-back guarantee
Read full NordVPN review
Surfshark logo
Best for Unlimited Devices
Surfshark
4.6/ 5

Unlimited devices, CleanWeb blocker, 100+ countries

Unlimited simultaneous devicesCleanWeb ad & malware blockerRAM-only server network30-day money-back guarantee
Save 87%
was $15.45/mo
$1.99/mo
Get Surfshark
30-day money-back guarantee
Read full Surfshark review
Proton VPN logo
Best for Privacy
Proton VPN
4.5/ 5

Swiss privacy laws, open-source, free tier

Swiss jurisdiction (no data laws)Open-source and auditedSecure Core multi-hopFree tier available forever
50% off
was $9.99/mo
$4.99/mo
Get Proton VPN
30-day money-back guarantee
Read full Proton VPN review
FastestVPN logo
Best Budget
FastestVPN
4.2/ 5

Lifetime plans, 10 devices, ad blocker

Lifetime deal available10 devices per accountBuilt-in ad blockerNo-logs policy
Save 89%
was $10/mo
$1.11/mo
Get FastestVPN
30-day money-back guarantee
Read full FastestVPN review

We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure

Notable Supply Chain Attacks

SolarWinds (2020)

Impact: 18,000 organizations including US government agencies

Method: Malicious code injected into Orion software update

Lesson: Even government-trusted software can be compromised

Codecov (2021)

Impact: Thousands of CI/CD pipelines

Method: Bash Uploader script modified to exfiltrate credentials

Lesson: Verify integrity of scripts you pipe to bash

Log4Shell (2021)

Impact: Millions of Java applications worldwide

Method: Zero-day in widely-used logging library

Lesson: Dependencies of dependencies can be attack vectors

3CX (2023)

Impact: 600,000 companies using 3CX phone system

Method: Compromised desktop app update distributed through official channels

Lesson: Legitimate update mechanisms can be weaponized

xz Utils (2024)

Impact: Nearly all Linux distributions

Method: Social engineering of open-source maintainer to inject backdoor

Lesson: Even critical open-source infrastructure is vulnerable to long-term social engineering

How Remote Workers Can Defend

Minimize Your Tool Surface

  • + Use fewer browser extensions
  • + Audit installed apps quarterly
  • + Remove unused software
  • + Prefer built-in OS tools when possible

Prefer Audited & Open-Source

  • + VPN: Proton VPN (open-source)
  • + Password manager: Bitwarden (open-source)
  • + Messaging: Signal (open-source)
  • + Browser: Firefox (open-source)

Monitor & Detect

  • + Enable OS security notifications
  • + Watch for unusual app behavior
  • + Check for unauthorized network connections
  • + Subscribe to security advisories for tools you use

Limit Blast Radius

  • + Use separate accounts for work and personal
  • + Don't run as admin for daily work
  • + Encrypt your disk
  • + Keep 3-2-1 backups current

Frequently asked

Frequently Asked Questions

Instead of attacking you directly, attackers compromise a trusted vendor or software update you already use. When you install the compromised update, the malware comes along. It's especially dangerous because you're trusting software you've been using safely for years.
You can't fully prevent them (you can't audit every line of code in every tool you use), but you can limit the damage: keep software updated (paradoxically), use defense-in-depth, monitor for unusual behavior, minimize the number of tools/extensions you use, and prefer open-source software where code is publicly auditable.
Remote workers often use more third-party tools than office workers (VPNs, collaboration apps, cloud services). Each tool is a potential supply chain target. Use reputable, audited tools, keep them updated, and prefer providers with transparency reports and open-source code.

Keep reading

Related Guides