{"id":5325,"date":"2024-07-15T10:26:04","date_gmt":"2024-07-15T10:26:04","guid":{"rendered":"https:\/\/locaterisk.com\/?p=5325"},"modified":"2026-02-12T14:42:42","modified_gmt":"2026-02-12T14:42:42","slug":"cyberangriffe-auf-die-lieferkette","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/cyberangriffe-auf-die-lieferkette\/","title":{"rendered":"Cyberattacks on the supply chain"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Cyberattacks on the supply chain: major attacks and their impact<\/h1>\r\n            <p class=\"paragraph\"><br>Cyberattacks on the supply chain are a serious threat to companies. Attackers exploit the vulnerabilities of business partners such as suppliers and service providers to gain access to other targets. In this article, we take a look at some of the most significant hacks of recent years and their impact. The examples illustrate the scope of such attacks and the need for risk assessment of third-party companies along the supply chain.<br><\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/LocateRisk-Cyberangriff-auf-die-Lieferkette-1.png\" alt=\"Grafik zum Thema Cyberangriff auf die Lieferkette\" class=\"wp-image-5374\" style=\"object-fit:cover\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/LocateRisk-Cyberangriff-auf-die-Lieferkette-1.png 800w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/LocateRisk-Cyberangriff-auf-die-Lieferkette-1-300x169.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/LocateRisk-Cyberangriff-auf-die-Lieferkette-1-768x432.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/LocateRisk-Cyberangriff-auf-die-Lieferkette-1-18x10.png 18w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">    <\/figcaption><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\"><strong>1. cyber attack<\/strong> on <strong>SolarWinds<\/strong><\/h3>\n\n\n\n<p>The attack on SolarWinds is considered one of the most serious cyberattacks in recent history. Attackers infected the updates for the Orion platform at the provider of network management solutions with the Sunburst malware. The affected customers include companies such as Microsoft, Intel and Cisco as well as several US ministries and authorities, up to 18,000 customers in total. The consequences were serious: the hackers were able to access sensitive data and Microsoft's program code. The attack on SolarWinds cost companies in key sectors an average of % of their annual turnover. The attack was attributed to the Russian hacker group APT29, also known as Cozy Bear, and was discovered in December 2020.<\/p>\n\n\n\n<p><strong><strong><strong><strong><strong>Facts overview<\/strong><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>Microsoft, Intel, Cisco, Deloitte, several US ministries and authorities, among others; up to 18,000 customers in total<\/li>\n\n\n\n<li>Attack path: <br>Hackers infected updates for SolarWinds' Orion network management platform with Sunburst malware<\/li>\n\n\n\n<li>In detail: <br>Installation of a backdoor on infected systems to take them over remotely. The attackers were able to access the user accounts of affected organizations and impersonate them<\/li>\n\n\n\n<li>Consequences: <br>Access to the network environment and program code at Microsoft; access to sensitive customer data<\/li>\n\n\n\n<li>Damage: <br>On average 11% of a company's annual turnover<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Cyber attack<\/strong> on <strong>MOVEit<\/strong>&nbsp;<\/h3>\n\n\n\n<p>One serious attack affected the data transfer program MOVEit Transfer from Progress Software Corp, a US company based in Burlington. MOVEit is used worldwide by many companies and service providers, especially banks and insurance companies, for the exchange of sensitive data. Using a zero-day SQL injection vulnerability, the attackers were able to bypass security controls and gain access to the confidential data of over 62 million people, including medical information and social security numbers. Customers affected include British Airways, BBC, US government agencies, several major healthcare providers from around the world, the University of Georgia and Heidelberger Druck etc. - more than 2000 customers in total. The estimated damage amounted to around USD 9.9 billion. The hacker group CLOP is suspected of having carried out this attack in June 2023.<\/p>\n\n\n\n<p><strong><strong><strong>Facts overview<\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Service provider: <br>Progress Software Corp.<\/li>\n\n\n\n<li>Affected customers: <br>British Airways, BBC, US authorities, PwC, EY, NYC public school system, among others; more than 2000 customers in total, including other service providers \u2192 cascading effect (see 3rd majorel)<\/li>\n\n\n\n<li>Attack path\/technique: <br>Zero-day exploit of a SQL injection vulnerability that can be used for Remote Code Execution (RCE)<\/li>\n\n\n\n<li>In detail: <br>The zero-day vulnerability allowed attackers to remotely penetrate the MOVEit Transfer database without authentication and inject SQL commands to modify or delete critical database elements<\/li>\n\n\n\n<li>Consequences: <br>Over 62 million people affected; including access to sensitive personal data such as medical information and social security numbers<\/li>\n\n\n\n<li>Damage: <br>~9.9 billion USD (estimate)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. <strong>Cyber attack<\/strong>&nbsp;Majorel<\/strong> Germany GmbH<\/h3>\n\n\n\n<p>As a result of the MOVEit hack, the Majorel Germany account switching service was hacked. Customers such as Barmer, ING, Deutsche Bank, Comdirect, some Sparda banks and others were affected. The attackers were able to steal personal data such as bank details and health insurance numbers. In total, more than 144,000 data records of bank customers appeared on the darknet. The attack was uncovered in July 2023. The exact amount of damage is not known.<\/p>\n\n\n\n<p><strong>Facts overview<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>e.g. Barmer, ING, Deutsche Bank, Comdirect, Postbank, Sparda-Banken, Versicherungskammer Bayern<\/li>\n\n\n\n<li>Attack path\/technique: <br>Zero-day exploit - The attack can be traced back to the MOVEit hack<\/li>\n\n\n\n<li>In detail: <br>Attackers were able to penetrate the MOVEit Transfer database and inject SQL commands<\/li>\n\n\n\n<li>Consequences: <br>Access to and publication of sensitive personal data such as bank details, health insurance numbers, premium contributions (at the insurer); in total, hackers captured more than 144,000 data records<\/li>\n\n\n\n<li>Damage: <br>No figures known<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. <strong>Cyber attack<\/strong> on Infosys McCamish Systems<\/strong><\/h3>\n\n\n\n<p>The US service provider for financial and insurance companies Infosys McCamish Systems (IMS) recorded a serious ransomware attack in November 2023. The data of over six million people was compromised, including names, addresses, dates of birth, social security numbers, medical records, credit card information and passwords. No details are available regarding the method of attack. Among the customers affected are the major US bank Bank of America Corporation (BofA) and the US pension insurance company Oceanview Life &amp; Annuity. The estimated loss for IMS is at least USD 30 million. The attack is attributed to the LockBit ransomware group.<\/p>\n\n\n\n<p><strong><strong><strong>Facts overview<\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>e.g. Bank of America Corporation (BofA), US pension insurance company<\/li>\n\n\n\n<li>Attack path\/technique:<br>Ransomware<\/li>\n\n\n\n<li>In detail: <br>Nothing known<\/li>\n\n\n\n<li>Consequences: <br>Sensitive data of over 6 million people was compromised. This included names, social security numbers, financial information, medical information, biometric data and passport numbers<\/li>\n\n\n\n<li>Damage: <br>IMS estimates at least USD 30 million; no information from BofA or Oceanview Life &amp; Annuity<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>5. <strong>Cyber attack<\/strong> on Kaseya<\/strong><\/strong><\/h3>\n\n\n\n<p>In July 2021, Kaseya, one of the world's leading providers of IT management software, fell victim to a ransomware attack. The attackers gained access to the remote maintenance software VSA via an unpatched zero-day vulnerability and created a malicious update that was automatically installed on the VSA servers in customers' networks. In addition to Kaseya, the affected companies included numerous IT service providers, resulting in a domino effect that affected up to 1500 organizations worldwide, including the Swedish supermarket chain Coop. The attackers initially demanded a ransom of USD 70 million, but later reduced the amount. The attack led to the encryption of data and systems and caused production downtime. Specific damage figures were not made public.<\/p>\n\n\n\n<p><strong>Facts overview<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>including Coop (supermarket chain); approx. 50 direct customers, including other service providers. A domino effect occurred, affecting up to 1500 organizations<\/li>\n\n\n\n<li>Attack path\/technique:<br>Attack on Kaseya's VSA software, which organizations use to manage software updates in computer systems <\/li>\n\n\n\n<li>In detail:<br>As a result of the VSA update manipulation, ransomware was transferred to customer networks&nbsp;<\/li>\n\n\n\n<li>The consequences: <br>Encryption of data and systems of affected organizations; production downtime in some cases; access to and publication of personal data<\/li>\n\n\n\n<li>The damage: <br>No concrete figures<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. <strong>Cyber attack<\/strong> on Adesso<\/strong><\/h3>\n\n\n\n<p>In early summer 2022, the IT service provider Adesso, whose customers include DAX companies such as Daimler, BMW, RWE and Eon as well as federal authorities such as the Federal Ministry of the Interior and for Home Affairs (BMI), the Federal Ministry of Digital and Transport (BMDV), the Federal Criminal Police Office (BKA), the financial supervisory authority Bafin and the Bundesbank, was hacked. The attackers had exploited a security vulnerability in Atlassian's Confluence software, manipulated plug-ins<em> <\/em>installed in systems and gained privileged access to systems and files in the internal network. The attack was first discovered by the Adesso security team in January 2023, but was only made public by a whistleblower. Concrete damage figures were not published.<br><\/p>\n\n\n\n<p><strong>Facts overview<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>including DAX companies, BMI, BMDV<\/li>\n\n\n\n<li>Attack path\/technique:<br>Security vulnerability in the enterprise wiki system \"Confluence\" from the software manufacturer Atlassian<\/li>\n\n\n\n<li>In detail: <br>Nothing known<\/li>\n\n\n\n<li>Consequences: <br>Access to individual information and files, including large amounts of e-mail communication with personal data<\/li>\n\n\n\n<li>Damage: <br>No figures known<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>7. <strong>Cyber attack<\/strong> on Count + Care<\/strong><\/h3>\n\n\n\n<p>A ransomware attack on the Hessian IT service provider Count + Care paralyzed several companies, including important KRITIS operators and municipalities, in June 2022. Attackers managed to penetrate the service provider's corporate network and encrypt data and systems. Count + Care is the IT subsidiary of the ENTEGA Group, one of Germany's leading energy and infrastructure service providers. In addition to the energy supplier, the Darmstadt-based transport company Heag, the Frankfurt Waste Disposal and Service Group (FES) and the Mainz municipal utilities were also affected. As a result of the attack, numerous personal data of ENTEGA employees and business partners ended up on the darknet.<\/p>\n\n\n\n<p><br><strong>Facts overview<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Affected customers: <br>including Entega, Frankfurter Entsorgungs- und Service-Gruppe (FES), Heag, Mainzer Stadtwerke<\/li>\n\n\n\n<li>Attack path\/technique: Ransomware<\/li>\n\n\n\n<li>In detail:<br>Nothing known<\/li>\n\n\n\n<li>Consequences: <br>Encryption of data and systems of affected organizations; homepages no longer accessible; services restricted (e.g. travel cancellations in local public transport)<\/li>\n\n\n\n<li>Damage: <br>No figures known<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Cyberattacks on the supply chain can develop into domino-like chain reactions. Companies must counter these threats with robust security measures to protect their systems and data. This requires a holistic security strategy that takes both technological and organizational aspects into account.<\/p>\n\n\n\n<p>A first step is the careful selection of service providers: Check the security standards and certifications of your providers. Make sure that your service providers comply with IT and data protection requirements (including regulations such as NIS2, <a href=\"https:\/\/locaterisk.com\/en\/dora-digital-operational-resilience-act\/\">DORA<\/a> and TSAX) and carry out regular security checks. LocateRisk's business partner risk management supports you with automated IT risk analyses and monitoring as well as digital questionnaires for supplier self-disclosure. This enables all parties involved to save time and costs, minimize risks and drive continuous improvement.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Read also <a href=\"https:\/\/locaterisk.com\/en\/lieferanten-risikomanagement-leicht-gemacht\/\" target=\"_blank\" rel=\"noreferrer noopener\">Supplier risk management for complex supply chains - made easy<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"cyberangriffe-auf-die-lieferkette\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks on the supply chain can develop into avalanche-like damage scenarios. An overview of significant attacks and their effects.<\/p>","protected":false},"author":8,"featured_media":5460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[67,68,45],"class_list":["post-5325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-cyberangriffe","tag-cyberattacke","tag-lieferkette"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberangriffe auf die Lieferkette - LocateRisk<\/title>\n<meta name=\"description\" content=\"Ein \u00dcberblick \u00fcber bedeutende Cyberangriffe auf die Lieferkette und deren Auswirkungen auf Unternehmen und Verbraucher.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/cyberangriffe-auf-die-lieferkette\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberangriffe auf die Lieferkette - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Ein \u00dcberblick \u00fcber bedeutende Cyberangriffe auf die Lieferkette und deren Auswirkungen auf Unternehmen und Verbraucher.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/cyberangriffe-auf-die-lieferkette\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-15T10:26:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T14:42:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Cyberangriffe auf die Lieferkette\",\"datePublished\":\"2024-07-15T10:26:04+00:00\",\"dateModified\":\"2026-02-12T14:42:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/\"},\"wordCount\":1509,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Kettenglieder_Generisch_03-1-Kopie.jpg\",\"keywords\":[\"Cyberangriffe\",\"Cyberattacke\",\"Lieferkette\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/\",\"name\":\"Cyberangriffe auf die Lieferkette - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Kettenglieder_Generisch_03-1-Kopie.jpg\",\"datePublished\":\"2024-07-15T10:26:04+00:00\",\"dateModified\":\"2026-02-12T14:42:42+00:00\",\"description\":\"Ein \u00dcberblick \u00fcber bedeutende Cyberangriffe auf die Lieferkette und deren Auswirkungen auf Unternehmen und Verbraucher.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Kettenglieder_Generisch_03-1-Kopie.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Kettenglieder_Generisch_03-1-Kopie.jpg\",\"width\":800,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberangriffe-auf-die-lieferkette\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberangriffe auf die Lieferkette\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks on the supply chain - LocateRisk","description":"An overview of major cyberattacks on the supply chain and their impact on businesses and consumers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/cyberangriffe-auf-die-lieferkette\/","og_locale":"en_US","og_type":"article","og_title":"Cyberangriffe auf die Lieferkette - LocateRisk","og_description":"Ein \u00dcberblick \u00fcber bedeutende Cyberangriffe auf die Lieferkette und deren Auswirkungen auf Unternehmen und Verbraucher.","og_url":"https:\/\/locaterisk.com\/en\/cyberangriffe-auf-die-lieferkette\/","og_site_name":"LocateRisk","article_published_time":"2024-07-15T10:26:04+00:00","article_modified_time":"2026-02-12T14:42:42+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg","type":"image\/jpeg"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Cyberangriffe auf die Lieferkette","datePublished":"2024-07-15T10:26:04+00:00","dateModified":"2026-02-12T14:42:42+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/"},"wordCount":1509,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg","keywords":["Cyberangriffe","Cyberattacke","Lieferkette"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/","url":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/","name":"Cyberattacks on the supply chain - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg","datePublished":"2024-07-15T10:26:04+00:00","dateModified":"2026-02-12T14:42:42+00:00","description":"An overview of major cyberattacks on the supply chain and their impact on businesses and consumers.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2024\/07\/Kettenglieder_Generisch_03-1-Kopie.jpg","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/cyberangriffe-auf-die-lieferkette\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Cyberangriffe auf die Lieferkette"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=5325"}],"version-history":[{"count":76,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5325\/revisions"}],"predecessor-version":[{"id":7575,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/5325\/revisions\/7575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/5460"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=5325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=5325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=5325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}