MSPs: the increasing targets in supply chain attacks

The rise of supply chain attacks highlights the vulnerability of MSPs, underscoring the need for enhanced security protocols across the supply chain.

Recent findings from Group-IB in their High-Tech Crime Trends Report 2026 suggest an alarming trend in cybercrime, with supply chain attacks driving a self-reinforcing economy of breaches, credential theft, and ransomware. At the core of this operation are managed service providers (MSPs), identified as significant targets by cybercriminals due to their access to numerous downstream customers.

MSPs often serve as crucial intermediary entities within various supply chains. Because they access multiple client systems, any compromise can quickly spread across different organisations. Hence, this makes them attractive targets for attackers who can leverage a single breach into larger-scale infiltrations.

Research indicates that MSPs might underestimate the potential scale of these attacks. Despite evidence to the contrary, only a minority of MSP leaders consider them a top priority. Yet, incidents like the 2025 breach by the Dragonforce ransomware gang illustrate the potential impact, wherein a single vulnerability within an MSP's remote monitoring tool opened the floodgates to a supply chain attack.

To mitigate these risks, MSPs need to adopt a rigorous approach towards supply chain security. Adhering to recognised security standards and practices, such as implementing least-privilege access and enforcing multi-factor authentication, is paramount. Furthermore, regular access reviews, continuous monitoring, and strict segmentation of client environments can prevent single-point failures from escalating.

A critical aspect of managing supply chain risks involves extending due diligence to technology vendors. Ensuring that third-party tools meet stringent security standards is crucial. With a collective approach to risk management, involving shared accountability, organisations can thwart the cascade effect of breaches across the supply chain.

In the face of these threats, institutions including MSPs should consider frameworks like the NCSC's Cyber Essentials Supply Chain Playbook to better structure their approach to supply chain security. Establishing clear standards and expectations with suppliers can significantly enhance transparency and prevent isolated incidents from becoming systemic failures.

Jamie Akhtar, CEO and Co-Founder of CyberSmart, said: "This research confirms what we’ve long suspected: modern supply chain risk doesn’t live in isolated systems but in interconnected ecosystems where breaches cascade across organisations. This trend shows how attacks on upstream vendors, open-source projects, browser extensions and managed service platforms can give adversaries inherited access to downstream customers, credentials and trust relationships."

Given the evolving landscape of cyber threats, organisations within supply chain networks must remain vigilant and proactive. Ensuring robust security measures not only protects them but also safeguards their clients and the wider interconnected ecosystem.
Westcon-Comstor is now the first European distributor for Proofpoint professional services,...
OBUSPA's integration with prpl and RDK aims to accelerate service rollouts, enabling broadband...
Westcon-Comstor expands cybersecurity support, offering enhanced services to partners of...
Zero Networks revamps its partner programme to foster channel-first growth and align security...
Scale Computing enhances its product offerings with the acquisition of Adaptiv Networks,...
Kong introduces Context Mesh, a tool to seamlessly connect enterprise data with AI agents, aiming...
The shift towards AI adoption in UK workplaces continues amid concerns over organisational...
Veeam appoints Nick McAlister as UKI Channel Director to strengthen its channel strategy across...