Incident Type: Supply Chain · Updated April 2026

Supply Chain Attack Cost: What Third-Party Incidents Cost in 2026

$4.76M
Avg per incident (IBM 2025)
Longest
Detection time of any category

A supply chain attack compromises an organisation by targeting a vendor, software supplier, or dependency the organisation trusts. The cost profile is distinctive: detection time is the longest of any incident category (often months), the blast radius extends across all of a compromised vendor's customers, and regulatory exposure multiplies because multiple organisations must notify their own regulators simultaneously.

Types of Supply Chain Attack

TypeMethodDetection DifficultyCost Multiplier
Software build compromiseMalicious code injected into legitimate software update (SolarWinds, 3CX)Very high - signed updatesVery high - all customers affected
Dependency compromiseMalicious package published to npm, PyPI, or RubyGemsHigh - auto-updated by CI/CDModerate to very high (log4j scope)
Vendor account compromiseAttacker gains access to a vendor's admin account (Okta 2022, LastPass 2022)ModerateHigh - vendor's customers at risk
Hardware supply chainMalicious components embedded in hardware during manufacturingExtremely highSystemic - affects all hardware units shipped
File transfer / integrationZero-day in widely-used integration tool (MOVEit, GoAnywhere)Low - exploit is immediateVery high - all vendor's customers exposed

Cost Multipliers Unique to Supply Chain

Detection delay

Supply chain compromises have the longest dwell time of any incident category. SolarWinds remained undetected for 9-14 months. MOVEit was deployed as a zero-day and discovered days later. IBM data shows detection time is the largest cost driver.

Cross-customer blast radius

Each of a compromised vendor's customers must conduct their own investigation, notify their own regulators, and implement their own remediation. The vendor's incident becomes hundreds or thousands of individual incidents.

Legal exposure from customers

Downstream organisations affected by a supply chain compromise may seek recovery from the vendor. SolarWinds faced class action litigation. Vendors face a compounding legal cost that victim-side organisations do not.

SBOM and audit remediation

Post-incident regulators increasingly require Software Bills of Materials (SBOM) and third-party risk assessments. These can cost $200K-$2M to implement for a mid-market software company.

Famous Supply Chain Incidents

IncidentYearTypeEst. CostNotes
SolarWinds Orion2020Software compromise$100M+ industry-wideNation-state; SolarWinds revenue dropped 23%
Log4Shell (Log4j)2021Dependency vulnerability$10B+ remediation est.CVSS 10.0; weeks of emergency patching globally
Kaseya VSA2021MSP software compromise$70M ransom demand (REvil)Supply chain ransomware via IT management tool
MOVEit (Cl0p)2023File transfer software$10B+ total est.SQL injection 0-day; data exfiltration from every customer
3CX Desktop App2023Software supply chainUndisclosed; targeted financial sectorTrojanised VOIP app; Lazarus Group attributed
XZ Utils backdoor2024Open-source dependencyAverted; potential nation-state access to SSHMulti-year infiltration of open-source project; caught before deployment

Cost Reducers

ControlCost Reduction MechanismEst. Implementation Cost
Software Bill of Materials (SBOM)Enables rapid identification of affected components when a dependency is compromised$50K-$200K initial; $20K-$50K/yr maintenance
Dependency scanning (SCA)Automated detection of vulnerable third-party packages before they reach production$20K-$80K/yr (Snyk, Veracode, Mend)
Third-party risk management (TPRM)Vendor assessment programme to pre-qualify security posture of critical suppliers$50K-$300K/yr
Zero trust architectureLimits blast radius if vendor credentials are compromised; prevents lateral movement$200K-$2M (multi-year programme)
Network segmentationIsolates vendor-connected systems; limits reach of compromised software$50K-$500K depending on complexity

Frequently Asked Questions

How much does a supply chain attack cost?
IBM CODB 2025 reports $4.76M average per supply chain incident, making it one of the costliest incident categories. However, this is the per-victim-organisation figure. For the compromised vendor at the root of the incident, costs are typically multiples higher due to customer litigation and regulatory exposure.
Why are supply chain attacks so expensive?
The combination of long dwell time (often months before detection), broad blast radius (all of a vendor's customers), and compounding regulatory exposure (each customer must notify their own regulators) creates a cost structure unlike any other incident type.
What is an SBOM and why does it matter for supply chain cost?
A Software Bill of Materials (SBOM) is a formal inventory of all software components in a product or system. When a component vulnerability is discovered (like log4j), an SBOM enables rapid identification of whether you are affected, dramatically reducing investigation cost and detection time.
IncidentCost.com is an independent educational resource. All cost figures are drawn from published industry research including IBM's Cost of a Data Breach Report, Ponemon Institute Cost of Insider Risks Report, Verizon Data Breach Investigations Report, Atlassian incident management research, and PagerDuty incident surveys. This site is not affiliated with IBM, Ponemon Institute, Verizon, Atlassian, PagerDuty, or any security vendor. Figures are for educational and planning purposes only.