Home OSINT News Signals
CYBER

Most notable supply-chain attacks of 2025 | Kaspersky official blog

đŸ•“ 1 min read

EXCLUSIVE: THE SUPPLY-CHAIN APOCALYPSE IS HERE — AND YOUR CRYPTO IS NEXT

Forget isolated data breaches. The most devastating cybersecurity threat of our era is now a silent war against the very tools we trust. 2025 wasn't just another year for malware; it was the year cybercriminals weaponized our infrastructure, launching unprecedented supply-chain attacks that shattered the blockchain security promise and emptied digital wallets on an industrial scale.

The campaign began with a sinister precision strike. In January, attackers compromised the private GitHub repository for DogWifTools, a utility for launching Solana meme coins. They waited, injected a remote access trojan (RAT) into a fresh build, and swapped it for the legitimate version. This wasn't a smash-and-grab; it was a patient, surgical exploit. The trojanized software harvested data for weeks before the final act: a coordinated drain of victims' crypto wallets, netting millions.

Then came February's seismic event: the Bybit heist. This was no ordinary exchange hack. Attackers compromised Safe{Wallet} software, a critical multisig cold storage solution. In a devastating twist, employees authorizing a routine transaction instead executed a malicious smart contract. The result? The largest crypto theft in history, with over 400,000 ETH—valued at a staggering $1.5 billion—vanishing into a maze of attacker-controlled addresses. This was a zero-day vulnerability turned into a global financial shock.

Security experts are sounding alarms. "We are witnessing the professionalization of digital bank robbery," one unnamed threat intelligence director told us. "The new playbook is simple: find one vulnerability in a trusted vendor, and you can exploit an entire ecosystem. The phishing emails are just the doorway; the supply chain is the highway." These attacks reveal a chilling evolution where the target isn't a single endpoint, but the foundational code and workflows upon which billions in assets depend.

Why should you care? Because your security is only as strong as your weakest dependency. Whether you're a developer using GitHub Actions or an investor on a major exchange, you are inherently trusting a chain of code you did not write and cannot fully audit. The promise of blockchain security is rendered null if the tools managing the keys are poisoned at the source.

We predict 2026 will see these attacks pivot from crypto-native tools to enterprise software, aiming for larger, more traditional data breach payouts. The supply chain is the new battlefield, and everyone is a potential casualty.

The age of trusting your tools is over. Verify everything, or lose it all.

Telegram X LinkedIn
Back to News