What Is a Supply Chain Attack?

A software supply chain attack targets the processes, tools, and systems used to build, distribute, and update software — rather than targeting the software itself or the organizations that use it. The attacker's goal is to compromise a trusted software vendor in a way that allows them to distribute malicious code to that vendor's customers as part of a legitimate software update.

The supply chain attack is particularly powerful because it exploits trust. When an organization's IT systems receive a software update from a trusted vendor — especially a vendor whose software is deeply embedded in the IT infrastructure, like SolarWinds' Orion network management platform — the organization's security controls are designed to allow that update to be installed. It is explicitly trusted. Detecting that a trusted update has been compromised requires a level of scrutiny that most organizations were not applying before SolarWinds made the risk vivid.

Supply chain attacks are not limited to software vendors. The modern enterprise relies on an extensive ecosystem of open-source libraries, third-party APIs, cloud services, and managed service providers. Each of these represents a potential supply chain attack vector. The scope of the problem — and the investment opportunity in addressing it — is substantially larger than most people appreciated before SolarWinds.

The Open-Source Dependency Problem

Modern applications depend heavily on open-source libraries and components. A typical enterprise web application imports hundreds of open-source packages, each with its own dependencies, creating a complex dependency tree that can include thousands of distinct software components. The total attack surface of this dependency tree is enormous, and enterprises typically have limited visibility into it.

Open-source supply chain attacks have become increasingly common and sophisticated. The attacks follow several patterns: compromising the accounts of legitimate open-source maintainers to push malicious code updates; creating typosquatted packages with names similar to popular libraries (e.g., "lodahs" instead of "lodash") and hoping developers make installation mistakes; and targeting dependency confusion attacks that exploit how package managers resolve package names across public and private registries.

Software Composition Analysis (SCA) tools address part of this problem by maintaining inventories of open-source dependencies and alerting developers when dependencies have known vulnerabilities. But SCA does not address malicious packages — packages that do not have CVEs because the malicious code is new, not a known vulnerability. Detecting malicious open-source packages requires behavioral analysis of package contents rather than simple vulnerability database lookup.

Software Bill of Materials: The Foundation of Supply Chain Visibility

A Software Bill of Materials (SBOM) is a complete, machine-readable inventory of all components — commercial, open-source, and internally developed — that make up a piece of software. In the physical manufacturing world, bill-of-materials documentation has been standard practice for decades. In software, it has been largely absent.

The SolarWinds attack and subsequent supply chain incidents have created significant momentum for SBOM adoption. The Biden administration's Executive Order on Cybersecurity, issued in May 2021, specifically mandated SBOM generation for software sold to the federal government. Industry consortia have coalesced around standard formats for SBOMs, with SPDX and CycloneDX emerging as the dominant standards.

SBOM generation is becoming a critical capability for software vendors, and SBOM consumption — the ability to ingest SBOMs from vendors and maintain an accurate inventory of what software is running in an enterprise environment — is becoming a critical capability for enterprise security teams. The companies building SBOM tooling and the software supply chain visibility platforms built on top of SBOMs are addressing a fast-growing and well-funded demand.

CI/CD Pipeline Security

The SolarWinds attack compromised the build pipeline — the automated system that takes source code and produces the distributable software artifact. This attack vector highlights the security implications of the CI/CD (Continuous Integration/Continuous Deployment) systems that have become standard in modern software organizations.

CI/CD pipelines are attractive targets for attackers because they have privileged access to source code, build artifacts, and deployment environments. A compromised CI/CD system can inject malicious code into builds, steal secrets and credentials, modify deployment configurations, or pivot to production environments. Yet CI/CD security has historically been an afterthought — tools designed primarily for developer productivity with security added incrementally.

The emerging CI/CD security market addresses several distinct challenges: securing the pipeline itself (protecting access to the CI/CD system, auditing pipeline configurations, detecting unauthorized pipeline modifications), securing the secrets and credentials that pipelines use (secret scanning, secret rotation, just-in-time credential issuance), and verifying the integrity of build artifacts (code signing, provenance attestation, artifact verification).

The Vendor Risk Management Imperative

Beyond software, the supply chain security problem extends to every vendor and third party that has access to an enterprise's systems, data, or infrastructure. Third-party vendors with privileged access to enterprise environments represent a significant and often poorly managed attack vector — a fact made dramatically clear by the Target breach of 2013, which entered through an HVAC vendor's credentials, and numerous subsequent incidents.

Vendor risk management (VRM) programs — systematic processes for evaluating and monitoring the security posture of third-party vendors — are becoming a core enterprise security function. Regulators in financial services, healthcare, and government sectors are increasingly mandating formal third-party risk management programs. The tools that automate VRM processes — security questionnaire platforms, continuous monitoring of vendor security posture, third-party risk scoring — are seeing significant enterprise demand.

We are particularly interested in the next generation of VRM platforms that go beyond questionnaires and scoring to provide active monitoring of vendor security posture. The most interesting companies in this space are using outside-in intelligence — passive monitoring of publicly observable indicators of a vendor's security posture — to provide continuous, real-time risk assessment rather than periodic questionnaire-based snapshots.

Key Takeaways

  • The SolarWinds attack demonstrated that trusted software distribution channels can be weaponized against enterprises with mature security programs.
  • Open-source dependency attacks are growing; SCA addresses known vulnerabilities but not malicious packages — behavioral analysis is needed.
  • Software Bill of Materials (SBOM) is becoming a mandatory capability for government software vendors and a best-practice for enterprise security teams.
  • CI/CD pipeline security — protecting the systems that build and deploy software — is an emerging and underserved market.
  • Third-party vendor risk management is transitioning from questionnaire-based to continuous, outside-in monitoring.

Conclusion

Supply chain security is one of the most complex and consequential challenges in enterprise security today. The problem is not new, but SolarWinds made its potential impact viscerally real to boards, regulators, and CISOs who had previously treated it as a theoretical risk. The regulatory and market response is driving rapid investment in supply chain security capabilities across multiple dimensions — from open-source dependency management to SBOM tooling to vendor risk platforms. Companies at the forefront of these capabilities are building in one of the most important growth areas in the enterprise security market. Connect with Key AI Ventures to discuss investment opportunities in this space.