Software Supply Chain Attacks Double Globally In 2025

Global losses from software supply chain attacks are projected to touch the $60 billion mark by year-end. October 2025 recorded the highest concentration of incidents, confirming sustained rather than episodic threat activity.

author-image
SMEStreet Edit Desk
New Update
CleanStart
Listen to this article
0.75x1x1.5x
00:00/ 00:00

A year-end security analysis “Securing the Software Supply Chain in 2026,”  released by CleanStart highlights an emerging systemic risk in modern software development Drawing on multiple industry research sources, the report shows that software supply chain attacks more than doubled globally during 2025. It further notes that over 70% of organisations reported experiencing at least one third-party or software supply chain-related security incident. Upstream compromise is becoming a persistent and structural risk rather than an isolated threat.

Global losses from software supply chain attacks are projected to touch the $60 billion mark by year-end. October 2025 recorded the highest concentration of incidents, confirming sustained rather than episodic threat activity.

The attack surface has fundamentally changed. Threat actors are not targeting traditional security  perimeters. Instead, they are compromising software at the source. In 2025, attacks entered organisations primarily during software assembly rather than deployment, shifting risk earlier in the lifecycle and challenging conventional security assumptions.

Key findings from the CleanStart report:

●     35% of attacks originated through compromised software dependencies

●     22% targeted CI/CD pipelines and build environments

●     20% involved poisoned or unverified container images

●     18% resulted from maintainer account takeovers

Dependencies, build pipelines and container images now represent 75% of all supply chain attack entry points. The report highlights that once a malicious component enters a base container image, it can propagate across 100% of downstream services that reuse it, significantly amplifying blast radius across environments.

Among organisations impacted by software supply chain incidents, the report found that the business consequences of upstream compromise varied significantly by sector. Banking and financial services face regulatory penalties and audit failures due to traceability gaps. E-commerce firms reported checkout outages and revenue loss from dependency issues. Media and entertainment companies experienced IP theft and content manipulation through compromised AI-driven pipelines. While vulnerabilities are shared, the report notes that BFSI carries the highest regulatory exposure, e-commerce faces the greatest revenue risk due to deployment velocity, and media and entertainment bears disproportionate IP and legal risk.

Nilesh Jain, CEO and Founder of CleanStart said, “2025 was the year software supply chain risk became measurable. For years, enterprise software conversations have been shaped by delivery speed and scale. What 2025 made clear is that velocity without verifiable foundations carries systemic risk. As organisations move into 2026, the focus will increasingly shift to proof: the ability to demonstrate where software comes from, how it is assembled, and whether its integrity can stand up to regulatory, operational and commercial scrutiny.”

The report identified a critical visibility gap. Fewer than 50% of enterprises currently monitor more than 50% of their extended software supply chain, leaving organisations exposed to upstream compromise. Runtime security controls consistently detected threats too late, highlighting the urgent need for build-time validation rather than post-deployment fixes. Despite rising attack volumes, the report places overall industry maturity between Level 1 and Level 2, characterised by scan-only approaches and limited operational control.

Supply Chain Software Supply Chain