Instead of directly attacking the target organization, attackers leverage the trust and connections established within the supply chain to gain access to sensitive data or systems. The true impact likely extends to more than 700 organizations due to undetected supply chain weaknesses The attackers targeted sentinelone through an it services and logistics provider—an approach designed to gain access via the company’s supply chain Supply chain attacks are a growing cybersecurity risk Software supply chain attacks inject malicious code into an application in order to infect all users of an app, while hardware supply chain attacks compromise physical components for the same purpose. A supply chain attack works by targeting a third party with access to an organization's systems rather than trying to hack the networks directly
This indirect method allows attackers to compromise multiple businesses through a single weak link in the supply chain. What is a supply chain cyberattack Historically, supply chain attacks were targeted at trust relationships, where insecure suppliers in the chain were attacked to gain access to their larger partners While traditional supply chain attacks are still a concern, an even bigger threat facing.
OPEN