{"id":4757,"date":"2026-03-08T07:36:40","date_gmt":"2026-03-08T07:36:40","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/03\/08\/huge-shadow-layer-of-organizations-hit-by-supply-chain-attacks\/"},"modified":"2026-03-08T07:36:40","modified_gmt":"2026-03-08T07:36:40","slug":"huge-shadow-layer-of-organizations-hit-by-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/03\/08\/huge-shadow-layer-of-organizations-hit-by-supply-chain-attacks\/","title":{"rendered":"Huge \u201cShadow Layer\u201d of Organizations Hit by Supply Chain Attacks"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Security experts have claimed that the blast radius of third-party data breach incidents is far larger than at first thought, with more than 433 million individuals impacted by 136 events last year.<\/p>\n<p>Black Kite compiled its seventh annual <em>Third-Party Breach Report <\/em>from analysis of verified public breach disclosures in 2025, external cyber risk telemetry and supply chain intelligence.<\/p>\n<p>It said 136 verified breaches had 5.28 publicly named downstream victims per vendor, amounting to 719 companies and 433 million individual end customers.<\/p>\n<p>However Black Kite said affected vendors also reported an additional 26,000 corporate victims without naming them. That could mean the total number of downstream individuals impacted is even greater. \u00a0\u00a0<\/p>\n<p><em>Read more on third-party breaches: SecurityScorecard Observes Surge in Third-Party Breaches.<\/em><\/p>\n<p>The ground zero for these events tended to be software services vendors, which accounted for 38 (28%) of the 136 verified breaches, followed by professional and technical services (14) and healthcare services providers (10).<\/p>\n<p>In terms of downstream corporate victims, most appear to be in healthcare (258), education (140) and financial services (101).<\/p>\n<p>\u201cThese sectors tend to combine high data sensitivity with heavy reliance on external platforms, placing them downstream in complex dependency chains,\u201d the report noted. \u201cThe pattern is consistent. Breach impact accumulates in data-rich sectors at the edges of the supply chain, while risk originates upstream, within a smaller set of centralized service providers.\u201d<\/p>\n<h2><strong>Less Visibility, More Risk<\/strong><\/h2>\n<p>The report also highlighted delays in breach discovery and public disclosure. The median time for vendors to detect an intrusion was 10 days, while the average was 68 days.<\/p>\n<p>While this indicates a problem with threat detection, delays in notification potentially reveal forensics and incident response issues. The report claimed that time to notify customers hit a median of 73 days and an average of 117 days.<\/p>\n<p>\u201cLet\u2019s be clear: 73 days is not an \u2018investigation period.&#8217;\u00a0In the context of active exploitation it is an eternity,\u201d the report noted. \u201cThis delay denies downstream customers the chance to revoke access, reset credentials or lock down their own systems. Transparency delayed is risk transferred.\u201d<\/p>\n<p>The chances of future breaches remain high. Of the 200,000 organizations monitored by Black Kite, over half (54%) had at least one critical vulnerability and 23% were found to have corporate credentials circulating on the dark web.<\/p>\n<p>An analysis of the top 50 \u201cmost shared\u201d vendors among Forbes Global 2000 customers found that:<\/p>\n<ul>\n<li>70% have at least one CISA KEV exposure, and 84% have critical vulnerabilities<\/li>\n<li>80% display exposure to phishing URLs, and 40% show signals of active targeting<\/li>\n<li>62% have corporate credentials exposed in stealer logs, and 30% have breached credentials in the past 90 days<\/li>\n<li>52% have a breach history, with 18% suffering an incident in the past year<\/li>\n<\/ul>\n<p>\u201cTraditional third-party risk management is not keeping pace with the reality of today\u2019s threats,\u201d argued Ferhat Dikbiyik, chief research and intelligence officer at Black Kite. \u201cOver the past year, these risks have transformed from a series of isolated accidents into a systematic crisis.\u201d<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security experts have claimed that the blast radius of third-party data breach incidents is far larger than at first thought, with more than 433 million individuals impacted by 136 events last year. Black Kite compiled its seventh annual Third-Party Breach Report from analysis of verified public breach disclosures in 2025, external cyber risk telemetry and<\/p>\n","protected":false},"author":2,"featured_media":4758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4757-e87cc9d4-9b0b-4dab-bb70-8eb00faa770c-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4757"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4757\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4758"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}