News: 1770897549

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Supply chain attacks now fuel a 'self-reinforcing' cybercrime economy

(2026/02/12)


Cybercriminals are turning supply chain attacks into an industrial-scale operation, linking breaches, credential theft, and ransomware into a "self-reinforcing" ecosystem, researchers say.

In its latest trends [1]report , Group-IB reckons individual strikes that lead to broader downstream compromises of businesses are now interconnected as cyberbaddies pursue multiple methods to breach vendors and service providers.

Supply chain hacks like the recent [2]Shai-Hulud NPM worm , [3]Salesloft debacle , or the OpenClaw [4]package poisoning are fast becoming the primary goals of the criminal fraternity who try to exploit the inherited access to a victim's customers.

[5]

"Open source package compromise feeds malware distribution and credential theft," the research states. "Phishing and OAuth abuse enable identity compromise that unlocks SaaS and CI/CD environments. Data breaches supply the credentials, context, and relationships needed to refine impersonation and lateral movement. Ransomware and extortion arrive later in the chain, capitalizing on access and intelligence gathered earlier. Each stage strengthens the next, creating a self-reinforcing cycle of supply chain exploitation."

[6]

[7]

Over the next year, GroupIB predicts supply chain attacks will be executed faster thanks to AI-assisted tools that can scan for vulnerabilities across vendors, CI/CD pipelines, and browser extension marketplaces at machine speed.

It also expects to see traditional malware replaced by identity attacks, whereby criminals set themselves up as genuine users and their activity blends into the normal daily business functions, evading detection for longer periods.

[8]

Platforms offering HR, CRM, and ERP, as well as [9]MSPs , are high-priority targets, Group-IB says, as a single compromise can lead to hackers gaining access to hundreds of customers.

Evolution of data breaches

The Salesloft breach, as well as the [10]Oracle compromise of March 2025, are examples of how data breaches are shifting from a single-reward model to one where access is used for additional compromises.

[11]Google: China's APT31 used Gemini to plan cyberattacks against US orgs

[12]Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

[13]Singapore spent 11 months booting China-linked snoops out of telco networks

[14]Nearly 17,000 Volvo staff dinged in supplier breach

Instead of taking one big wedge of data and demanding an extortion payment, criminals took their time to collect OAuth tokens and exploit misconfigured partner connections to move laterally. They then target downstream customers, steal their data and contact lists to repeat the cycle, or, in cases involving NPM and similar ecosystems, serve malicious updates to users to carry out fraud at scale.

"Cybercrime is no longer defined by single breaches. It is defined by cascading failures of trust," said Dmitry Volkov, Group-IB CEO.

"Attackers are industrializing supply chain compromise because it delivers scale, speed, and stealth. A single upstream breach can now ripple across entire industries. Defenders must stop thinking in terms of isolated systems and start securing trust itself, across every relationship, identity, and dependency."

Organizations should treat third parties as extensions of their own attack surface.

[15]

"Strategic investments in supply chain threat modeling, automated dependency checks, and data flow visibility are no longer optional – they are foundational to modern security architecture," said Volkov. ®

Get our [16]Tech Resources



[1] https://www.group-ib.com/landing/high-tech-crime-trends-report-2026/

[2] https://www.theregister.com/2025/11/24/shai_hulud_npm_worm/

[3] https://www.theregister.com/2025/08/27/salesforce_salesloft_breach/

[4] https://www.theregister.com/2026/01/27/clawdbot_moltbot_security_concerns/#:~:text=He%20was%20able%20to%20upload%20a%20publicly%20available%20skill%2C%20artificially%20inflate%20the%20download%20count%20to%20more%20than%204%2C000%2C%20and%20watch%20as%20developers%20from%20seven%20countries%20downloaded%20the%20poisoned%20package.

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aY4HMaCBdMEen3oeUoh0JAAAAQA&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aY4HMaCBdMEen3oeUoh0JAAAAQA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aY4HMaCBdMEen3oeUoh0JAAAAQA&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aY4HMaCBdMEen3oeUoh0JAAAAQA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[9] https://www.theregister.com/2025/05/28/dragonforce_ransomware_gang_sets_fire/

[10] https://www.theregister.com/2025/04/08/oracle_cloud_compromised/

[11] https://www.theregister.com/2026/02/12/google_china_apt31_gemini/

[12] https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/

[13] https://www.theregister.com/2026/02/10/singapore_telco_espionage/

[14] https://www.theregister.com/2026/02/10/conduent_volvo_breach/

[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aY4HMaCBdMEen3oeUoh0JAAAAQA&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[16] https://whitepapers.theregister.com/



The world is full of people who have never, since childhood, met an
open doorway with an open mind.
-- E. B. White