Softomate Solutions logoSoftomate Solutions logo
I'm looking for:
Recently viewed
Supply Chain Cyber Attacks: How UK Businesses Can Protect Themselves — Softomate Solutions blog

CYBER SECURITY

Supply Chain Cyber Attacks: How UK Businesses Can Protect Themselves

9 May 202614 min readBy Softomate Solutions

What Is a Supply Chain Cyber Attack?

A supply chain cyber attack is an intrusion in which attackers compromise an organisation by targeting its suppliers, vendors, software providers, or other third parties rather than attacking the target directly. By compromising a trusted supplier, attackers gain a foothold in the target's environment that bypasses many of the technical and procedural defences the organisation has put in place to protect its own perimeter. Supply chain attacks are particularly dangerous because they exploit the trust relationships that modern businesses depend on to function.

Softomate Solutions is a London-based cyber security consultancy helping UK businesses identify and manage the cyber risks in their supply chains. Our vulnerability assessment and penetration testing services include supply chain risk assessment, third-party security evaluation, and testing of the integration points between your organisation and its suppliers. The NCSC has identified supply chain attacks as one of the highest-priority threats facing UK organisations, and recent major incidents have demonstrated the catastrophic scale of damage that a successful supply chain attack can cause.

The SolarWinds attack of 2020, the Kaseya ransomware attack of 2021, the MOVEit exploitation of 2023, and the Okta breaches of 2022 and 2023 all demonstrated that even organisations with mature internal security programmes can be severely compromised through a trusted supplier. UK businesses with supply chains that include software vendors, managed service providers, or cloud platforms are all potential targets.

What Types of Supply Chain Attack Affect UK Businesses?

Supply chain attacks take several distinct forms, each requiring different defensive approaches:

Software Supply Chain Attacks

Attackers compromise a software vendor's build or distribution infrastructure and inject malicious code into legitimate software updates. When the target organisation installs the update from a trusted vendor, it unknowingly installs the attacker's malware. The SolarWinds attack, which affected over 18,000 organisations worldwide including UK government agencies and defence contractors, is the most significant example of this attack type. Software supply chain attacks are particularly difficult to detect because the malicious update is signed with the vendor's legitimate code-signing certificate and delivered through the normal update mechanism.

Managed Service Provider (MSP) Attacks

Managed service providers have administrative access to the systems of many of their clients simultaneously. Compromising an MSP gives attackers the ability to pivot to any or all of that MSP's client organisations. The Kaseya attack targeted an MSP software platform used by thousands of MSPs worldwide, enabling ransomware to be deployed simultaneously across hundreds of downstream client organisations. UK businesses that rely on MSPs for IT support, monitoring, or management are exposed to this risk category.

Open Source Software Supply Chain Attacks

The ubiquity of open source components in modern software creates a vast attack surface. Attackers compromise popular open source packages through account takeover, typosquatting (creating malicious packages with names similar to legitimate ones), or by contributing malicious code to legitimate projects. The XZ Utils backdoor discovered in 2024 - in which a sophisticated attacker spent two years building trust in an open source project before injecting a backdoor - illustrated the sophistication and patience of adversaries targeting open source supply chains.

Hardware Supply Chain Attacks

Compromising hardware at the manufacturing or distribution stage - inserting malicious components or firmware into devices before they reach the end customer - is a less common but high-impact attack type typically associated with nation-state actors. UK organisations purchasing hardware from suppliers in jurisdictions with different security standards or regulatory environments face elevated risk of hardware supply chain interference.

Business Email Compromise via Supplier Accounts

Compromising a supplier's email environment and using it to send fraudulent payment requests, data requests, or malware to the supplier's clients is a common attack pattern. Because the email originates from a legitimate supplier domain, it passes email authentication checks and is trusted by recipients. This attack type combines supply chain compromise with business email compromise and is particularly prevalent in property, legal, and professional services sectors where large payments are routinely made to known counterparties.

How Can UK Businesses Assess Their Supply Chain Cyber Risk?

Effective supply chain risk management begins with understanding what your supply chain actually looks like. Many organisations have poor visibility into their full supplier ecosystem - they know their direct suppliers but have limited insight into the sub-processors, sub-contractors, and technology dependencies that their suppliers rely on. A supply chain risk assessment should map this ecosystem systematically.

Supplier Inventory and Tiering

Start by identifying all suppliers that have any connection to your systems, data, or operational processes. This includes IT suppliers (hardware, software, cloud platforms, MSPs), data processors (payroll, HR, finance, marketing), professional services (legal, accountancy, consultancy), and facilities suppliers with any physical access to your premises. Tier these suppliers by the risk they represent - a supplier with administrative access to your core systems carries fundamentally different risk from a supplier who delivers stationery.

Critical Supplier Identification

Critical suppliers are those whose failure or compromise could cause significant harm to your operations, data, or clients. For most UK businesses, critical suppliers include their cloud platform provider, their line-of-business software vendor, their MSP, and any supplier with access to client or employee personal data. Critical suppliers warrant the most intensive due diligence and ongoing monitoring.

Due Diligence Assessment

For critical and high-risk suppliers, due diligence should include: review of security certifications (Cyber Essentials, ISO 27001, SOC 2 Type II); review of penetration testing reports and remediation evidence; review of data processing agreements and sub-processor chains; assessment of the supplier's incident response and notification procedures; and understanding of their business continuity and disaster recovery capabilities. For the highest-risk relationships, a right to audit clause in the contract and periodic security assessments by your own team or a third-party assessor may be warranted.

Contractual Security Requirements

Contracts with critical suppliers should include explicit security requirements: minimum security standards (referencing Cyber Essentials or equivalent), data processing obligations under UK GDPR, incident notification timelines (faster than the 72-hour regulatory minimum for your own ICO notification), right to audit provisions, and requirements to notify you of significant changes to their security posture or technology environment. Many UK businesses have contracts with critical IT suppliers that contain no meaningful security provisions - this is a high-risk gap.

What Technical Controls Reduce Supply Chain Cyber Risk?

Beyond supplier management, technical controls within your own environment can significantly limit the impact of a supply chain compromise:

Principle of Least Privilege for Supplier Access

Suppliers that require system access should have the minimum access necessary to deliver their service. Administrative or privileged access should be time-limited and conditional - granted for specific maintenance windows and revoked automatically afterwards. All supplier access should use multi-factor authentication and should be logged and monitored. The principle that a supplier's access should be bounded by what they need, not by what is convenient for them, is fundamental to supply chain risk reduction.

Network Segmentation

Systems accessible to supplier management interfaces or remote support tools should be segmented from your core data processing and business systems. This limits the blast radius of a supplier compromise - an attacker who gains access through a supplier's tooling should encounter significant barriers to reaching sensitive data or critical systems. Segmentation also makes it easier to monitor and detect anomalous traffic originating from supplier access points.

Software Composition Analysis

Organisations that develop their own software, or that use software with open source components, should deploy Software Composition Analysis (SCA) tooling that maintains an inventory of all third-party and open source components in use (a Software Bill of Materials, or SBOM) and monitors for new vulnerabilities or compromise events affecting those components. This makes it possible to respond quickly when a component in your software supply chain is found to be compromised, as was the case with the Log4j vulnerability in 2021.

Software Allowlisting and Update Verification

Restricting which software can run on your systems to an approved list reduces the risk of malicious software - whether delivered through a supply chain attack or otherwise - executing on your endpoints. Verifying software update authenticity, including checking code-signing certificates and hash values, provides a further layer of assurance. These controls are particularly important for systems that receive automated updates from third-party vendors.

Monitoring for Supply Chain Indicators

Threat intelligence specific to your software and service supply chain - monitoring for reports of compromise, new vulnerabilities, or anomalous activity in vendors you rely on - enables faster response when a supply chain event occurs. NCSC's Active Cyber Defence programme provides threat intelligence feeds relevant to UK organisations, and sector-specific ISACs provide additional intelligence sharing. Monitoring your own environment for indicators of compromise associated with known supply chain attacks should be part of your Security Operations Centre (SOC) or managed detection and response (MDR) service brief.

How Should UK Businesses Respond to a Supply Chain Security Incident?

When a supply chain partner notifies you of a breach, or when you discover indicators of a supply chain compromise in your own environment, the response must be swift and structured. The first priority is to understand the scope - what access did the compromised supplier have, what systems or data were potentially accessible through that access, and what indicators of compromise are present in your environment.

Key response actions include:

  • Immediately revoke or restrict the compromised supplier's access to your systems pending investigation.
  • Conduct a forensic review of logs and monitoring data to identify whether the attacker used the supplier's access to reach your environment.
  • Assess whether personal data was accessed or exfiltrated, and whether ICO notification is required within 72 hours.
  • Assess whether FCA, SRA, or other sector regulator notification is required for your regulated activities.
  • Communicate to affected parties with factual, controlled information - not speculation.
  • Engage your cyber incident response retainer or the NCSC's Incident Management team for significant incidents.
  • Document everything for regulatory and insurance purposes.

A pre-defined supply chain incident response plan, tested through a tabletop exercise, is significantly more effective than improvising a response during an active incident. The NCSC's guidance on supply chain security provides a framework that UK organisations can use to structure their response planning.

What Do the NCSC and Cyber Essentials Say About Supply Chain Security?

The NCSC has published extensive guidance on supply chain security, including its Supply Chain Security collection which covers risk assessment, due diligence, and contract requirements in detail. NCSC guidance emphasises that managing supply chain risk is a continuous process, not a one-time assessment - the risk associated with a supplier changes as their business, technology, and threat environment evolve.

Cyber Essentials, the UK government-backed certification scheme, does not explicitly address supply chain risk in its five core controls. However, Cyber Essentials does require that all software installed on in-scope devices is supported and patched, which is directly relevant to software supply chain risk. Organisations that achieve Cyber Essentials Plus, with its hands-on technical testing, demonstrate that their endpoint and patch management controls are effective - reducing the risk that a supply chain software compromise could be installed and persist without detection.

For organisations seeking a more comprehensive supply chain security assessment framework, ISO 28001 (Supply chain security management systems) and ISO 27036 (ICT supply chain security) provide structured approaches. Our cyber security consultancy team has experience applying these frameworks to UK SMEs without the overhead of full certification.

Related Reading

Frequently Asked Questions

What is the most common supply chain cyber attack affecting UK SMEs?

Business email compromise via a compromised supplier email account is the most prevalent supply chain attack affecting UK SMEs. Attackers compromise a supplier's email environment and use it to send fraudulent payment requests or malware to the supplier's clients. Because the email appears to come from a trusted source, it bypasses many technical and human defences. Conveyancers, accountants, and businesses that regularly make large payments to known suppliers are the most frequently targeted. The primary mitigations are verbal verification of any payment instruction changes, advanced email filtering, and supplier awareness of the threat.

How do we know if our MSP has been compromised?

Signs that your managed service provider may have been compromised include: unexpected changes to your systems or configurations outside of agreed maintenance windows; alerts from your own monitoring systems for unusual privileged activity; your MSP notifying you of an incident (reputable MSPs have contractual obligations to do this promptly); media reports of your MSP suffering a security breach; and indicators of compromise - unusual outbound traffic, new scheduled tasks, unknown processes - that correlate with timing of MSP access sessions. If you suspect your MSP has been compromised, immediately restrict their access to your systems and engage your own incident response resources independently of the MSP.

Does UK GDPR apply to our supply chain?

Yes. Under UK GDPR, organisations that engage third parties to process personal data on their behalf must ensure those processors provide sufficient guarantees about security, and must have a written Data Processing Agreement in place. If a processor suffers a breach that affects your organisation's data, you as the controller bear regulatory responsibility to notify the ICO within 72 hours if the breach is likely to result in risk to individuals. The processor's breach notification to you must arrive in time for you to meet your own notification window. Ensuring that your data processing agreements require processors to notify you of breaches within 24 to 48 hours is therefore essential.

How often should we review the security of our critical suppliers?

Critical supplier security should be reviewed at minimum annually, and whenever there is a significant change in the supplier relationship - a change in ownership, a major technology migration, an expansion of the services they provide, or a public report of a security incident affecting the supplier. Some organisations conduct quarterly security reviews for their highest-risk suppliers, particularly those with broad privileged access to core systems. Periodic reviews should cover current certifications, any changes to the sub-processor chain, and evidence of ongoing vulnerability management and patching discipline.

What should a software bill of materials (SBOM) include?

An SBOM is a comprehensive inventory of all components, libraries, and dependencies within a software product, including open source packages and third-party libraries. A complete SBOM should include the name, version, and supplier of each component; the licence associated with each component; known vulnerabilities affecting each version; and the dependency relationships between components. SBOMs should be maintained and updated whenever the software is updated. In the event of a supply chain security event affecting a specific component (such as a compromise of a widely used open source library), an SBOM enables you to quickly determine whether your systems are affected and take remediation action.

Are small UK businesses a realistic target for supply chain attacks?

Yes. While the most sophisticated supply chain attacks target large organisations with high-value data or critical infrastructure roles, smaller businesses are frequently collateral targets. A threat actor who compromises a software vendor or MSP serving thousands of clients does not discriminate by size - all connected clients are simultaneously exposed. Small businesses are also directly targeted when they are part of the supply chain for a larger target - an attacker wanting to reach a large enterprise may find the easiest path is through a small supplier with lax security and trusted access to the enterprise's environment. Robust supplier security practices protect your business regardless of whether you are the primary or secondary target.

What is the NCSC's guidance on supply chain security?

The NCSC's supply chain security guidance is available at ncsc.gov.uk and covers the full lifecycle of supply chain risk management including: understanding your supply chain and its associated risks; working with suppliers to improve security; using due diligence questionnaires and assessments; including security requirements in contracts; and responding to supply chain security incidents. The NCSC also publishes specific guidance for organisations that are part of other organisations' supply chains, recognising that supply chain security is a shared responsibility. The guidance is practical and accessible, with worked examples and assessment frameworks that UK organisations of all sizes can apply.

Let us help

Need help applying this in your business?

Talk to our London-based team about how we can build the AI software, automation, or bespoke development tailored to your needs.

Deen Dayal Yadav, founder of Softomate Solutions

Deen Dayal Yadav

Online

Hi there รฐลธ'โ€น

How can I help you?