{"id":127820,"date":"2025-06-18T12:10:29","date_gmt":"2025-06-18T09:10:29","guid":{"rendered":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/"},"modified":"2025-06-18T12:10:29","modified_gmt":"2025-06-18T09:10:29","slug":"global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities","status":"publish","type":"post","link":"https:\/\/shiawaves.com\/english\/news\/science\/cyber-attack\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/","title":{"rendered":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities"},"content":{"rendered":"<p>Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nThe surge in supply chain cyberattacks by state-sponsored groups is raising alarm over global cybersecurity resilience, an article by Anadolu Agency revealed. These sophisticated actors increasingly target subcontractors\u2014soft spots within organizational defenses\u2014to reach larger, high-value targets indirectly. Such tactics involve injecting malicious code into software updates or remote access tools, compromising thousands of organizations and exposing millions of personal records.<\/p>\n<p>Dmitry Galov, head of Kaspersky\u2019s Global Research and Analysis Team, warned that threat actors, often backed by governments, have grown more advanced. Referring to the recent Linux XZ Utils vulnerability, he explained how attackers manipulated open-source developers over years to embed covert backdoors. \u201cEvery supply chain attack is tailored and unpredictable,\u201d he said, highlighting the importance of behavioral analysis and AI tools to detect malicious payloads.<\/p>\n<p>Galov noted that smaller subcontractors are primary targets because they often have weaker defenses and provide access privileges to larger entities. To counter threats, companies are advised to conduct rigorous vendor assessments, software verification, and continuous monitoring. He stressed that fighting these evolving threats requires layered defense strategies, international cooperation, and shared intelligence\u2014no single technology can solve supply chain vulnerabilities alone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; The surge in supply chain cyberattacks by state-sponsored groups is raising alarm over global cybersecurity resilience, an article by Anadolu Agency revealed. These sophisticated actors increasingly target subcontractors\u2014soft spots within organizational defenses\u2014to reach larger, high-value targets indirectly. Such tactics involve injecting malicious code &hellip;<\/p>\n","protected":false},"author":1,"featured_media":127819,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"facebook_108372464460192_245495985553329":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[11610],"tags":[],"class_list":["post-127820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves\" \/>\n<meta property=\"og:description\" content=\"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; The surge in supply chain cyberattacks by state-sponsored groups is raising alarm over global cybersecurity resilience, an article by Anadolu Agency revealed. These sophisticated actors increasingly target subcontractors\u2014soft spots within organizational defenses\u2014to reach larger, high-value targets indirectly. Such tactics involve injecting malicious code &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Shia Waves\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-18T09:10:29+00:00\" \/>\n<meta name=\"author\" content=\"modir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"modir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/\",\"url\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/\",\"name\":\"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves\",\"isPartOf\":{\"@id\":\"https:\/\/shiawaves.com\/english\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg\",\"datePublished\":\"2025-06-18T09:10:29+00:00\",\"dateModified\":\"2025-06-18T09:10:29+00:00\",\"author\":{\"@id\":\"https:\/\/shiawaves.com\/english\/#\/schema\/person\/9f68d5023e948086b9348fba5aebd954\"},\"breadcrumb\":{\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg\",\"contentUrl\":\"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg\",\"width\":729,\"height\":415},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/shiawaves.com\/english\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/shiawaves.com\/english\/#website\",\"url\":\"https:\/\/shiawaves.com\/english\/\",\"name\":\"Shia Waves\",\"description\":\"Just another ShiaWaves site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/shiawaves.com\/english\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/shiawaves.com\/english\/#\/schema\/person\/9f68d5023e948086b9348fba5aebd954\",\"name\":\"modir\",\"sameAs\":[\"https:\/\/shiawaves.com\"],\"url\":\"https:\/\/shiawaves.com\/english\/author\/modir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves","og_description":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; The surge in supply chain cyberattacks by state-sponsored groups is raising alarm over global cybersecurity resilience, an article by Anadolu Agency revealed. These sophisticated actors increasingly target subcontractors\u2014soft spots within organizational defenses\u2014to reach larger, high-value targets indirectly. Such tactics involve injecting malicious code &hellip;","og_url":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/","og_site_name":"Shia Waves","article_published_time":"2025-06-18T09:10:29+00:00","author":"modir","twitter_card":"summary_large_image","twitter_misc":{"Written by":"modir","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/","url":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/","name":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities - Shia Waves","isPartOf":{"@id":"https:\/\/shiawaves.com\/english\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg","datePublished":"2025-06-18T09:10:29+00:00","dateModified":"2025-06-18T09:10:29+00:00","author":{"@id":"https:\/\/shiawaves.com\/english\/#\/schema\/person\/9f68d5023e948086b9348fba5aebd954"},"breadcrumb":{"@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#primaryimage","url":"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg","contentUrl":"https:\/\/shiawaves.com\/english\/wp-content\/uploads\/sites\/4\/2025\/06\/file_304.jpg","width":729,"height":415},{"@type":"BreadcrumbList","@id":"https:\/\/shiawaves.com\/english\/uncategorized\/127820-global-cybersecurity-under-threat-as-state-linked-hackers-exploit-supply-chain-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shiawaves.com\/english\/"},{"@type":"ListItem","position":2,"name":"Global Cybersecurity Under Threat as State-Linked Hackers Exploit Supply Chain Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/shiawaves.com\/english\/#website","url":"https:\/\/shiawaves.com\/english\/","name":"Shia Waves","description":"Just another ShiaWaves site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shiawaves.com\/english\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/shiawaves.com\/english\/#\/schema\/person\/9f68d5023e948086b9348fba5aebd954","name":"modir","sameAs":["https:\/\/shiawaves.com"],"url":"https:\/\/shiawaves.com\/english\/author\/modir\/"}]}},"_links":{"self":[{"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/posts\/127820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/comments?post=127820"}],"version-history":[{"count":0,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/posts\/127820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/media\/127819"}],"wp:attachment":[{"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/media?parent=127820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/categories?post=127820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shiawaves.com\/english\/wp-json\/wp\/v2\/tags?post=127820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}