Supply Chain Attacks Explained
Instead of attacking you directly, sophisticated attackers compromise trusted software you already use. Here's how supply chain attacks work and how to defend against them.
Our Top 4 VPN Picks
Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.
Fastest speeds, audited no-logs, 6000+ servers
Unlimited devices, CleanWeb blocker, 100+ countries
Swiss privacy laws, open-source, free tier
Lifetime plans, 10 devices, ad blocker
We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure
Notable Supply Chain Attacks
SolarWinds (2020)
Impact: 18,000 organizations including US government agencies
Method: Malicious code injected into Orion software update
Lesson: Even government-trusted software can be compromised
Codecov (2021)
Impact: Thousands of CI/CD pipelines
Method: Bash Uploader script modified to exfiltrate credentials
Lesson: Verify integrity of scripts you pipe to bash
Log4Shell (2021)
Impact: Millions of Java applications worldwide
Method: Zero-day in widely-used logging library
Lesson: Dependencies of dependencies can be attack vectors
3CX (2023)
Impact: 600,000 companies using 3CX phone system
Method: Compromised desktop app update distributed through official channels
Lesson: Legitimate update mechanisms can be weaponized
xz Utils (2024)
Impact: Nearly all Linux distributions
Method: Social engineering of open-source maintainer to inject backdoor
Lesson: Even critical open-source infrastructure is vulnerable to long-term social engineering
How Remote Workers Can Defend
Minimize Your Tool Surface
- + Use fewer browser extensions
- + Audit installed apps quarterly
- + Remove unused software
- + Prefer built-in OS tools when possible
Prefer Audited & Open-Source
- + VPN: Proton VPN (open-source)
- + Password manager: Bitwarden (open-source)
- + Messaging: Signal (open-source)
- + Browser: Firefox (open-source)
Monitor & Detect
- + Enable OS security notifications
- + Watch for unusual app behavior
- + Check for unauthorized network connections
- + Subscribe to security advisories for tools you use
Limit Blast Radius
- + Use separate accounts for work and personal
- + Don't run as admin for daily work
- + Encrypt your disk
- + Keep 3-2-1 backups current
Frequently asked
Frequently Asked Questions
Keep reading