Saturday, July 12, 2025

Cybercriminals Ramp Up Attacks on Tech Supply Chains, Fuel Black Market Deals on Dark Web

The walls around tech companies are holding, but the floors beneath them — their supply chains — are being pulled out from under. As attackers shift focus to third-party suppliers, a surge in breaches and leaked data is turning the Dark Web into a full-blown black market for stolen infrastructure.

Cyberattacks aimed at key pieces of the software and cloud ecosystems are rising fast, with criminals increasingly bragging and bargaining over the stolen goods online. From GitHub repositories to Oracle servers, recent incidents show no layer of tech is too small or too buried to be spared.

Oracle Cloud and GitHub Breaches Put the Spotlight on Supply Chain Weak Points

Back in March, a hacker going by the alias “rose87169” made a bold post on BreachForums, claiming they had access to Oracle Cloud systems. At first, Oracle denied anything had happened. But not long after, the company quietly admitted to customers that two servers had been breached — servers storing usernames and passwords.

That’s not the kind of news a cloud giant wants to send out.

In a similar time frame, a different attacker used a compromised GitHub personal access token to hijack the tj-actions/changed-files automation. That move impacted over 23,000 repositories. Coinbase’s repo was one of them — possibly the main target. And just like that, a tiny crack in one GitHub Action cascaded into chaos across multiple organizations.

These aren’t one-off flukes. They’re warning shots. And the message is clear.

hacker oracle breach dark web credentials leak

Cybercriminals Are Now Trading More Than Just Data Dumps

Hackers aren’t just stealing credentials anymore. They’re marketing them.

Trustwave’s June 25 report revealed how attackers on Dark Web forums now openly sell:

  • Credentials with access to internal tools and systems

  • Undocumented APIs

  • Remote management portals

  • Developer environments

  • Cloud infrastructure keys

They’re not being subtle. Many listings explicitly explain how buyers can use the access to leapfrog into connected systems downstream. It’s not just about breaking into one place — it’s about how far you can go once you’re in.

A single stolen credential could give attackers a pathway into dozens of vendors, clients, and users. Like dominoes, one weak link in the chain sends the rest tumbling.

Insurance Claims Reveal the True Cost of Supply Chain Breaches

The financial side of all this? It’s catching up.

At-Bay Security’s “2025 InsureSec Report” showed a massive jump in cyber-insurance claims tied to third-party breaches. In 2021, they were a rounding error. In 2024? They made up 11% of claims.

That number may seem small, but in insurance terms, it’s a flashing red light. Insurers track what hurts their bottom line — and third-party ransomware attacks are starting to bite.

These claims include:

  • Business disruptions from suppliers getting locked out of their own systems

  • Leaks of confidential data posted to Dark Web leak sites

  • Legal costs and penalties for mishandled customer data

That’s not just someone else’s problem anymore.

Dark Web Deals Are Growing More Brazen and Structured

That’s straight from Trustwave’s report.

Attackers are thinking like sellers. They’re bundling access rights with usage instructions. Some listings even pitch access to key vendors as a launching pad for broader attacks.

It’s not wild speculation — it’s organized crime meeting enterprise strategy.

Here’s how these listings typically play out:

Type of Access What’s Offered Potential Risk
Admin credentials Privileged access to vendor dashboards Lateral movement into downstream client systems
API keys Undocumented or unmonitored endpoints Data theft or backdoor setup
Remote management portals Access to IT tools Malware injection, ransomware deployment
Build systems Dev environments with CI/CD control Code tampering, software supply chain poisoning

And in case it wasn’t clear — none of this is theoretical. It’s all already happened.

What Security Experts Say Needs to Happen Next

So what can be done?

For starters, experts say companies need to stop pretending this is someone else’s problem. Kory Daniels, CISO at Trustwave, put it plainly: the first step is identifying your critical third-party dependencies.

“You can’t protect what you don’t know exists,” he says.

From there, organizations should look at a few essentials:

  • Mandate multifactor authentication for all accounts, not just internal ones

  • Monitor vendors with threat intelligence tools or outsource to firms that do

  • Include security checks in vendor contracts — such as due-diligence audits

  • Keep tabs on the Dark Web — not just for your company, but for your partners too

Still, most companies don’t even know if their own employees are using MFA. So it’s no surprise they have zero visibility into their vendors.

Supply Chains Are Now Prime Real Estate for Cybercriminals

Supply chain attacks have ripple effects. A breach at a single provider can hit hundreds of clients. And the more attackers realize this, the more they aim for those entry points.

Laurie Iacono at At-Bay summed it up: “These are incidents where our insureds suffer losses that are attributable to the security failures of another company.”

It’s no longer about who gets hit first. It’s about who’s connected to who — and how fast the infection spreads.

Sometimes, the vendor doesn’t even know they’ve been compromised until their clients start calling.

“We need to get deeper insights into our supply chain so that we don’t get caught flatfooted and reactive.”

Flatfooted is where a lot of companies still are. And the clock’s ticking.

Santosh Smith
Santosh Smith
Santosh is a skilled sports content writer and journalist with a passion for athletics. With expertise in various sports such as football, basketball, and soccer, he provides his readers with accurate, compelling, and tailored content. His knowledge and research skills make him an expert in providing in-depth analysis and valuable insights on the latest sports news and events.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

Underground Rave Scene in China: A Pulse of Rebellion and Freedom

Crouching through a small metal door into a dark...

Luke Humphries Weight Loss Journey with Before & After Image

Luke Humphries, the British professional darts player, has recently...

Amazon Prime for Seniors: How to Get Discounts and Save Big?

Amazon Prime offers fantastic benefits such as free delivery,...

How to Complain About Amazon Delivery Driver? A Guide for Unsatisfied Customers

File a complaint through the Amazon app or website...