Listen to this Post
In a world where cyber threats evolve faster than most defenses can keep up, the 2025 Third-Party Breach Report from Black Kite has unveiled a sobering reality. Ransomware attacks didn’t just increase in 2024 — they exploded, surging by 123%. And the main culprit? Vulnerabilities in third-party vendor ecosystems.
This report uncovers a disturbing shift in the strategies of threat actors. Instead of attacking organizations head-on, hackers are targeting their weakest links: suppliers, contractors, and partners. These seemingly peripheral connections have become the launchpads for some of the most damaging cyberattacks ever recorded.
Companies such as Cencora and those impacted by the CrowdStrike outage experienced firsthand the catastrophic consequences of failing to adequately secure their vendor relationships. With third-party breaches leading to billions in damages and operational chaos, the need for proactive, data-driven Third-Party Risk Management (TPRM) has never been more critical.
The Alarming Rise of Third-Party Breaches
123% Increase in Ransomware: 2024 saw a massive spike in ransomware attacks, with vendor ecosystems being exploited at unprecedented levels.
Vendors: The New Frontline: Third-party providers were identified as the top initial access vector, responsible for some of the most high-profile breaches to date.
Cencora Breach: A \$75 million ransomware payout resulted from a vendor-related infiltration into the pharmaceutical giant’s systems.
CrowdStrike Outage: A vulnerability in a supplier’s software update mechanism led to a global IT disruption, with damages estimated at \$5 billion.
Tactical Shift in Attacks: Threat actors now prefer infiltrating less-defended third parties, using them as stepping stones to larger targets.
Weaponized Software Vulnerabilities: Hackers exploited flaws in vendor products to infiltrate broader networks.
Credential Theft on the Rise: Misused credentials allowed attackers to bypass security and gain deep access across organizations.
Reconnaissance-Driven Infiltration: Cybercriminals conducted extensive mapping of supply chains to identify and exploit weak links.
Supply Chain Complexity: Massive vendor networks with poor oversight expanded the attack surface dramatically.
Industries Under Fire: Healthcare, finance, and manufacturing were hit hardest due to their reliance on diverse third-party vendors.
Healthcare Breakdown: Breaches caused widespread outages and compromised sensitive patient data.
Financial Fallout: Banks faced customer distrust, fraud incidents, and regulatory backlash following vendor-related attacks.
Manufacturing Halts: Ransomware crippled supply chains, causing delays and lost revenue.
Legacy Systems at Fault: Outdated tech and poorly segmented networks worsened the impact of lateral cyber movement.
Visibility Gaps: Most organizations lacked real-time insight into their vendors’ cybersecurity posture.
Insufficient Defenses: Traditional perimeter-based security measures proved ineffective against modern multi-vector attacks.
Too Little, Too Late: Many companies discovered breaches only after the damage had been done.
Reactive Culture: A delayed response to breaches is no longer viable in the face of increasingly sophisticated attacks.
TPRM is the New Imperative: Black Kite emphasizes that a proactive and continuous approach to third-party security is essential.
Real-Time Risk Monitoring: Companies must implement tools that provide instant alerts about vendor threats.
Collaborative Strategy: Success depends on strong partnerships between organizations and their suppliers.
Custom Incident Response Plans: Tailored plans for third-party attacks help mitigate damage quickly.
The Weakest Link Rule: A company is only as secure as the least protected vendor in its network.
CISO Wake-Up Call: Security leaders must rethink vendor management from the ground up.
Increased Investment Needed: More resources must be allocated to cyber risk management across the supply chain.
Shared Responsibility Model: Vendors must be held accountable for maintaining strong security practices.
Futureproofing: Lessons from 2024 should drive immediate action to prepare for more advanced attacks in 2025 and beyond.
What Undercode Say:
The findings from the 2025 Black Kite report paint a grim but necessary portrait of today’s cybersecurity battlefield. Organizations are no longer isolated fortresses — they are intricately woven into a global web of suppliers and digital collaborators. Unfortunately, this interconnectedness, while enabling business efficiency, has also introduced severe security liabilities.
In previous years, attackers often tried to break into fortified networks directly. But today, the smarter path for them lies through the shadows — in third-party systems often left unchecked or underprotected. This isn’t just a trend. It’s a strategic evolution in cyber warfare.
The Cencora incident is a glaring example. One supplier’s weakness led to a \$75 million breach. Meanwhile, CrowdStrike’s massive outage revealed just how far-reaching the damage can be when a single vendor vulnerability triggers a domino effect across industries.
It’s not just about money. In sectors like healthcare, patient care was delayed, and lives were possibly endangered. Financial institutions saw trust erode, and manufacturers had to halt production lines, sometimes for weeks.
Black Kite’s emphasis on TPRM reflects a shift toward more holistic security frameworks. Businesses must start viewing their third-party vendors not as external entities, but as internal extensions of their infrastructure. Just as you wouldn’t ignore your own IT department’s security measures, you shouldn’t neglect those of your critical suppliers.
What’s clear is that the old ways — reactive defenses, once-a-year audits, and blind trust in vendor certifications — are no longer sufficient. Real-time visibility, automated threat intelligence, and continuous engagement are the new norms.
Organizations must now invest in platforms that constantly scan vendor ecosystems for signs of compromise. They must establish rules for how vendors access their systems and demand cybersecurity transparency as a prerequisite for doing business. Cyber insurance alone is no longer a safety net — proactive prevention is now the only viable strategy.
Ultimately, supply chain attacks will only get more advanced. As AI-driven hacking tools and sophisticated phishing campaigns become more accessible, the entry barriers for attackers are lowering. It’s no longer just about protecting your own front door — it’s about watching every door connected to your house.
CISOs and risk managers should prioritize creating a unified response strategy that spans across their entire vendor ecosystem. This means aligning with legal, compliance, procurement, and IT teams to ensure everyone understands the risks and response plans. Collaboration is not optional. It’s survival.
2024 was a warning. If organizations don’t learn from it and act swiftly, 2025 could be even more destructive.
Fact Checker Results:
Black Kite’s report is backed by verified breach data from real-world incidents. The documented cases of Cencora and CrowdStrike are accurate and publicly acknowledged. The statistical growth in ransomware and vendor-related attacks is supported by multiple cybersecurity research institutions.
Prediction:
Looking ahead, ransomware groups will likely continue refining their vendor-targeting strategies. Expect to see more breaches through compromised software supply chains, especially involving small but critical service providers. Regulations around vendor cybersecurity compliance will tighten, forcing companies to adopt robust TPRM platforms or risk legal and financial penalties. Organizations that act now will avoid becoming tomorrow’s headline.
References:
Reported By: cyberpress.org
Extra Source Hub:
https://www.digitaltrends.com
Wikipedia
Undercode AI
Image Source:
Unsplash
Undercode AI DI v2