Threat Landscape
Software companies are the supply chain. Their breach is downstream-customer breach in 24 hours.
The technology and SaaS threat landscape is defined by a structural reality the rest of the economy is still adapting to: the software companies that build the technology infrastructure of every other industry are themselves the infrastructure-supply-chain attack surface for those industries. A breach of a single SaaS provider — Snowflake, Okta, MOVEit, SolarWinds, CrowdStrike — produces consequence across hundreds or thousands of unaffiliated commercial customers within hours. The 2020 SolarWinds Sunburst campaign established the template; subsequent variants have refined the execution.
The 2024 Snowflake campaign is the canonical recent illustration. Cyber criminals associated with the threat group ShinyHunters (tracked by Mandiant as UNC5537) targeted approximately 165 Snowflake customer accounts using stolen credentials harvested from infostealer malware infections dating back as far as 2020. Over 80% of compromised accounts had prior credential exposure. Affected accounts lacked multi-factor authentication — successful authentication required only username and password. Snowflake itself was not compromised; the customer-side configurations were. The campaign affected hundreds of millions of individuals across at least nine publicly named victims: AT&T (109M call and text records), Ticketmaster (560M), Santander Bank, Lending Tree (190M+), Advance Auto Parts (2.3M), Pure Storage, LA Unified, Truist Bank, and others. [01]
In 2024, software supply-chain compromise produced more downstream-customer breach consequence than any other vector class. The software supply chain is the attack surface. The customer-relationship contract that disclaims responsibility for downstream consequence is a legal artefact. The architectural responsibility is undisclaimable.
The 2024 incident calendar extends well beyond Snowflake. The July 2024 CrowdStrike Falcon update incident — a faulty content-configuration update pushed to Windows endpoints running CrowdStrike Falcon — caused approximately 8.5 million Microsoft Windows computers to fail globally. Delta Air Lines alone incurred USD 550 million in cost. Hospitals cancelled surgeries. Banks went offline. Airlines reverted to handwritten boarding passes. The incident was not a cyberattack — but it demonstrated the cybersecurity-equivalent fragility of every industry that depends on a small number of widely deployed software platforms. [02]
The earlier examples remain instructive. The 2023 Okta breach of customer support case management compromised credentials of approximately 134 customers including Cloudflare, where attackers used the credentials to access Cloudflare's Atlassian platforms (Bitbucket, Confluence, Jira) and reach source code. The 2023 Cl0p / MOVEit campaign exploited a single zero-day vulnerability in Progress Software's file-transfer product to compromise hundreds of organisations across financial services, healthcare, education, and government sectors. The 2020 SolarWinds Sunburst campaign — attributed to Russia's SVR / APT29 — affected US federal agencies and Fortune 500 companies through trojanised software updates pushed via trusted vendor channels.