Supply Chain Security: Testing Your Vendors Before Attackers Do

The Vendor That Opened Every Door

During a red team engagement for a defense contractor, we spent two weeks testing their hardened perimeter. MFA everywhere. Segmented networks. Well-trained employees who reported our phishing attempts.

Then we pivoted to their managed service provider.

The MSP had VPN access for “maintenance purposes.” Their help desk gave us credentials after a 10-minute social engineering call. Those credentials worked on the contractor’s network. Within 24 hours, we had access to classified program documentation.

The contractor had spent millions on their own security. Their vendor spent next to nothing.

Your security is only as strong as your weakest vendor.


Why Supply Chain Attacks Work

The Trust Problem

Organizations extend trust to vendors:

  • VPN access for remote support
  • API credentials for integrations
  • Physical access for maintenance
  • Network connectivity for managed services

Each trust extension is a potential attack path.

The Visibility Problem

Your Environment Vendor Environment
You control security policy You hope they have one
You monitor for threats You can’t see their network
You train employees You trust their training
You test defenses They probably don’t

The Asymmetry Problem

Attackers have learned: why attack the fortress when you can attack the supply wagon?

Direct Attack Supply Chain Attack
Hardened target Softer target
Monitored activity Less visibility
Limited access Often privileged access
High effort Often easier

Major Supply Chain Breaches (Recent History)

Supply Chain Breaches Timeline

SolarWinds (2020)

  • Attack Vector: Compromised software update mechanism
  • Victims: 18,000+ organizations received the trojanized update; fewer than 100 actively targeted including US government agencies
  • Access Achieved: Trusted software with administrative privileges
  • Lesson: Even “trusted” software can be weaponized

Kaseya (2021)

  • Attack Vector: MSP management platform vulnerability
  • Victims: 1,500+ businesses through ~60 MSPs
  • Access Achieved: Ransomware deployment via trusted management tool
  • Lesson: One vendor compromise affects thousands

MOVEit (2023)

  • Attack Vector: Zero-day in file transfer software
  • Victims: 2,770+ organizations, 95M+ individuals affected
  • Access Achieved: Data exfiltration from trusted file transfers
  • Lesson: Data sharing tools are high-value targets

Change Healthcare (2024)

  • Attack Vector: Stolen credentials used to access a Citrix remote access portal lacking MFA
  • Victims: 192M+ individuals; disrupted healthcare claims processing nationwide
  • Access Achieved: Healthcare payment processing disruption
  • Lesson: Central chokepoints create systemic risk

XZ Utils Backdoor (2024)

  • Attack Vector: Multi-year social engineering campaign to embed a backdoor in the XZ compression library used across nearly all Linux distributions
  • Victims: Caught days before widespread distribution; would have compromised SSH authentication on millions of servers
  • Access Achieved: Backdoor in a trusted open-source dependency, targeting SSH authentication
  • Lesson: Open-source supply chains are vulnerable to long-term, patient compromise

Polyfill.io (2024)

  • Attack Vector: Acquisition of the polyfill.io domain by a malicious entity, followed by injection of malicious JavaScript into the CDN
  • Victims: 100,000+ websites that embedded the polyfill.io script
  • Access Achieved: Malicious code execution in browsers of site visitors
  • Lesson: CDN and third-party script dependencies create invisible trust chains

What We Test (And What We Find)

Vendor Access Assessment

We evaluate how vendors connect to your environment:

Access Type Common Finding
VPN access Shared credentials, no MFA, excessive permissions
API integration Overprivileged tokens, no rotation, poor secrets management
Physical access Unescorted access, badge sharing, no background checks
Remote support Persistent access, unmonitored sessions, credential reuse

Vendor Security Posture

Through OSINT and authorized testing, we assess:

Technical Indicators:

  • Public-facing vulnerabilities
  • Data exposure (leaked credentials, misconfigured storage)
  • Email security (SPF/DKIM/DMARC configuration)
  • Certificate management

Organizational Indicators:

  • Security certifications (SOC 2, ISO 27001)
  • Incident history
  • Employee security awareness (social media OPSEC)
  • Published security practices

Trust Boundary Analysis

Vendor Trust Chain Attack Path

We map how vendor access could enable attacks:


Vendor VPN Access
    └── Corporate Network (VLAN 10)
        └── Active Directory Access
            └── Service Account Enumeration
                └── Domain Admin Path Identified
                    └── Access to Production Data

The Questionnaire Problem

What Organizations Do

Send 200-question security questionnaires to vendors. Receive checkbox answers. File in compliance folder. Never verify.

Why It Doesn’t Work

Questionnaire Says Reality Often Is
“MFA is implemented” MFA is available but not enforced
“Annual pentest performed” Pentest scope was limited, findings not remediated
“Encryption at rest” Encryption keys stored with data
“Security awareness training” Annual 15-minute video, no testing
“Incident response plan” Plan exists, never tested

The Attestation Gap

The Attestation Gap

Vendors attest to their security based on their understanding of the question. That understanding varies wildly:

Question: “Do you perform vulnerability scanning?”

  • Vendor interpretation A: “We run Nessus weekly”
  • Vendor interpretation B: “We have a scanner license”
  • Vendor interpretation C: “IT runs Windows Update”

All might answer “Yes.”


A Better Approach: Vendor Security Assessment

Tier Your Vendors by Risk

Vendor Risk Tiering Matrix

Not all vendors deserve the same scrutiny:

Tier Criteria Assessment
Critical Access to crown jewels, network connectivity, data processing Full security assessment + annual pentest
High Limited privileged access, handles sensitive data Security questionnaire + verification + periodic assessment
Medium Business-critical but no sensitive access Security questionnaire + spot verification
Low No sensitive access, easily replaceable Standard terms, basic verification

Critical Vendor Assessment Components

For Tier 1 vendors, we recommend:

1. Technical Assessment (Authorized)

  • External penetration test of vendor’s environment
  • Review of integration points and access controls
  • API security assessment
  • Credential and secrets management review

2. Process Assessment

  • Incident response capability verification
  • Change management review
  • Employee security practices
  • Subcontractor management

3. Ongoing Monitoring

  • Continuous external posture monitoring
  • Threat intelligence for vendor indicators
  • Breach notification alerting
  • Annual reassessment

Contractual Requirements

Your vendor contracts should require:


Security Requirements:
- Annual penetration test by qualified third party
- 72-hour breach notification
- Right to audit clause
- Minimum security controls (MFA, encryption, logging)
- Insurance requirements
- Subcontractor approval

Testing Your Vendor Trust

Scenario 1: The MSP Compromise

We simulate a compromised managed service provider:

  1. Assume attacker has MSP credentials
  2. Test what access those credentials provide
  3. Map lateral movement possibilities
  4. Identify data accessible via MSP access
  5. Test detection of MSP-based attacks

Common Finding: MSP service accounts have Domain Admin rights “because they need to fix things quickly.”

Scenario 2: The Software Supply Chain

We assess software vendor risk:

  1. Inventory software with automatic update capability
  2. Analyze update mechanisms for tampering potential
  3. Review code signing and verification
  4. Test detection of malicious updates
  5. Identify software with excessive permissions

Common Finding: Agents run as SYSTEM, auto-update without verification, have network access.

Scenario 3: The Integration Point

We test API and data integrations:

  1. Map all vendor API connections
  2. Assess authentication and authorization
  3. Test for excessive data exposure
  4. Verify logging and monitoring
  5. Test credential rotation capabilities

Common Finding: API tokens never rotated, provide more access than needed.


Case Study: The HVAC Vendor

A financial services client had strong perimeter security. Annual penetration tests consistently showed good results against direct attack paths.

We expanded scope to include vendor assessment.

What We Found

Their building management vendor (HVAC, lighting, access control) had:

  • Network connectivity to corporate network (needed for badge system integration)
  • VPN credentials stored in shared documentation
  • No MFA on VPN access
  • Workstations with direct internet access and corporate network access
  • Employees who would provide “password resets” over the phone

The Attack Path


Social Engineer HVAC Help Desk
    └── Obtain VPN Credentials
        └── Connect to Corporate Network
            └── Discover Badge System Server
                └── Pivot to Corporate Domain
                    └── Domain Compromise

Sound familiar? This mirrors the Target breach of 2013, where attackers phished an HVAC contractor (Fazio Mechanical Services) to steal network credentials and pivot into Target’s payment systems. The specific technique changes, but the attack pattern has not, because most organizations still have not addressed vendor access risk.


Quick Wins: Immediate Actions

1. Inventory Vendor Access

Create a complete list:

  • Who has VPN access?
  • What service accounts exist for vendors?
  • What API integrations exist?
  • Who has physical access?

If you can’t produce this list quickly, that’s your first problem.

2. Apply Least Privilege

For each vendor access:

  • What do they actually need?
  • Can access be time-limited?
  • Can access be scoped to specific systems?
  • Is MFA enforced?

3. Monitor Vendor Activity

Ensure logging covers:

  • VPN connections from vendor accounts
  • Service account authentication
  • API usage patterns
  • After-hours access

4. Test the Assumptions

Pick your most critical vendor. Call their help desk. Try to social engineer credentials. You’ll learn something valuable either way.


The Board Conversation

When presenting supply chain risk to leadership:

The Risk:

“Our critical vendors have access that, if compromised, would give attackers the same access as a successful direct attack. We’ve verified our own defenses but haven’t verified theirs.”

The Evidence:

“In recent testing, we identified [X] vendor access paths that could enable network compromise. [MSP/Software Vendor/Integration Partner] has access that requires the same scrutiny we apply to our own systems.”

The Ask:

“We’re requesting budget to assess our top 5 critical vendors and establish ongoing vendor security requirements. This addresses a risk that caused the [SolarWinds/Kaseya/MOVEit] incidents that affected organizations with stronger direct defenses than ours.”


Conclusion: Extend Your Perimeter

Your Real Security Perimeter

Your security perimeter doesn’t end at your firewall. It extends to every vendor with access to your environment, every software that auto-updates, every API integration.

Testing your own defenses while ignoring vendor risk is like locking your front door while leaving the garage open.

We help organizations understand and address vendor risk through:

  • Critical vendor penetration testing
  • Vendor access assessment
  • Supply chain attack simulation
  • Vendor security program development

Your attackers are already thinking about your vendors. Are you?


If your scan reports keep growing but your remediation rate has not changed, the gap is already there. BladeIntel publishes threat intelligence and security research to help businesses understand the risks they face. For more analysis like this, follow us at bladeintel.com or subscribe to our threat briefings.

Kevin Sutton
Kevin Suttonhttps://hiredhackers.com/
Principal Security Consultant over 30 years of IT and cybersecurity expertise spanning Fortune 100 companies and global enterprises. CISSP since 2003 and CISA since 2005, with deep experience securing critical infrastructure across Energy, Aviation, Healthcare, Finance, and Retail industries.

Latest articles

Related articles