Close Menu
Crypto Chain Post
    Trending

    Former Ripple Exec Follows Michael Saylor’s Bitcoin Playbook

    June 7, 2025

    Ripple USD (RLUSD) Volume Down 57%, Bigger Threat to XRP?

    June 7, 2025

    Hyperliquid coin forms bullish pennant as momentum builds: is a breakout imminent?

    June 7, 2025

    Spot Ether ETFs ongoing inflow streak has hit $812.2M inflows

    June 7, 2025

    Brazil Defies Trump Tariff Threats, Backs Dollar-Free BRICS Trade

    June 7, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Saturday, June 7
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Supply Chain Attack

    Supply Chain Attack

    News RoomBy News RoomDecember 30, 2022No Comments2 Mins Read

    A supply chain attack is a tactic used by hackers to compromise third-party suppliers to major corporations, governments and organizations to gain valuable information.

    Supply chain attacks are increasingly prominent, with the latest high-profile Solar Winds attack in the United States in 2020. In this example, hackers (widely believed to be Russian) compromised a software provider used by Fortune 500 companies, government agencies, and many more organizations. By attacking Solar Winds, the hackers could indirectly attack all of these entities indirectly. 

    By using a trojan horse update, the hackers gained access to a vast amount of sensitive and possibly top-secret information held by branches of the military, the state department, and the pentagon. The extent of the breach is still unknown and many estimate that it will take more than a year to recover and fully remove any threat of lingering surveillance. 

    The Solar Winds example is a classic case of how devastating a supply chain attack can be. Since so many modern operations rely on software and services from third-party suppliers like cybersecurity firms, it is increasingly difficult to keep systems safe. Supply chain attacks go beyond cybercrime and begin to enter the arena of cyber warfare. In the coming years, supply chain attacks could be used for extortion, surveillance and to gain control over sensitive networks.

    Back to Glossary Index Page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Ripple USD (RLUSD) Volume Down 57%, Bigger Threat to XRP?

    June 7, 2025

    Hyperliquid coin forms bullish pennant as momentum builds: is a breakout imminent?

    June 7, 2025

    Spot Ether ETFs ongoing inflow streak has hit $812.2M inflows

    June 7, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.