1 Real-World Supply Chain Attack Patterns
Supply chain attacks compromise software at the build or distribution stage rather than attacking the end target directly. They are among the most impactful attacks because one compromise affects thousands of downstream users.
SolarWinds (2020):
- Attackers compromised the SolarWinds Orion build pipeline
- Malicious code was injected into the official signed update package
- 18,000+ organizations installed the backdoored software
- Victims included US government agencies, security firms
XZ Utils backdoor (2024):
- Attacker "Jia Tan" spent 2 years gaining trust as a project maintainer
- Injected a sophisticated backdoor into the XZ compression library
- Targeted SSH authentication in systemd-linked sshd
- Detected by chance before widespread deployment
Build tool compromises:
- Codecov bash uploader modified (April 2021) — exfiltrated CI environment variables
- event-stream npm package: maintainership transferred, malicious code added