Techie Tonic: Global cyber threat surge puts supply chains on high alert

State-aligned hackers weaponise supply chains as a new frontline of hybrid warfare

Last updated:
Anoop Paudval, Head of Information Security Governance, Risk, and Compliance (GRC) for Gulf News
Coordinated cyber campaigns turn trusted vendors into gateways for global attacks
Coordinated cyber campaigns turn trusted vendors into gateways for global attacks
Supplied

An interesting discussion with few cybersecurity experts from different industry on Supply Chain attacks and related risk in this current situation, forced me write this article. All of them in one voice said that a surge in coordinated cyber operations targeting global supply chains has prompted urgent warnings from cybersecurity experts, who say the digital threat landscape has entered one of its most volatile periods in recent years.

Security analysts monitoring under these Cyber leaders say, activity between February 28 till date report a dramatic escalation in cyber campaigns tied to geopolitical tensions that erupted at the end of February. During this period, state-aligned threat actors and hacktivist collectives have launched widespread operations aimed at critical infrastructure, financial systems, healthcare providers, and technology supply chains.

Get updated faster and for FREE: Download the Gulf News app now - simply click here.

Researchers from cybersecurity firms like NST Cyber say the attacks reflect a strategic shift from traditional espionage to large-scale supply-chain intrusions designed to spread across interconnected organizations.

“Instead of directly attacking a single company, attackers are targeting vendors, service providers, and software suppliers, once compromised, these trusted partners become gateways into dozens or even hundreds of downstream organizations.”

Rise of the “electronic operations room”

The “Electronic Operations Room” represents a major evolution in hybrid warfare, particularly in the Middle East, acting as a loosely structured but highly effective coordination hub, often via platforms like Telegram for state-aligned hacktivist groups. It enables synchronised cyber operations among dozens of groups, marking a shift from basic activities like website defacements to more sophisticated attacks such as DDoS campaigns, credential theft, and targeting critical infrastructure including energy, water, and transport systems. These operations increasingly focus on strategic disruption across regional logistics and infrastructure. Notably, the rise of such coordination lowers the barrier to entry for advanced cyber warfare, as AI tools and publicly available resources empower a broader range of actors. Integrated alongside physical military actions, this model reflects a growing convergence of cyber and kinetic warfare, increasing the speed, scale, and unpredictability of modern conflict.

One of the leading CISOs, James Wiles, Head of Cyber Security - Middle East & Africa, Cigna Healthcare explained, the structure appears to function as a centralised command mechanism that organizes distributed cyber campaigns such as distributed denial-of-service (DDoS) attacks, website defacements, data leaks, and infrastructure disruption.

Threat intelligence suggests the groups are combining ideological motivations with support or direction from state-linked cyber units, creating a hybrid threat environment where espionage, sabotage, and propaganda intersect.

Supply chain attacks accelerate

James warns that supply-chain compromises are particularly dangerous because they exploit trusted relationships between organisations.

James Wiles
James Wiles

Instead of breaching a company directly, attackers infiltrate software vendors, managed service providers (MSPs), or operational technology integrators. Through these relationships, hackers can inherit privileged access and bypass security controls designed to protect individual networks.

In some cases, a single compromised vendor account can allow attackers to move laterally across multiple organisations simultaneously.

“This model effectively weaponises ”.

Major incidents across sectors

All the experts mentioned, several significant cyber incidents were confirmed during the monitoring period.

One of the most severe occurred on March 11, when the hacktivist group Handala allegedly launched a destructive cyberattack against one of the medical technology manufacturers in the west. By gaining administrative access to the company’s mobile device management system, attackers reportedly issued remote wipe commands that erased more than 200,000 systems across 79 countries.

The group claimed to have stolen 50 terabytes of data, though that claim has not been independently verified.

Authorities have since launched a formal investigation into the breach, which analysts say demonstrates how enterprise device-management platforms can become powerful attack tools when compromised.

Another campaign targeting developers involved a large-scale supply-chain operation known as “GlassWorm.” Investigators discovered that attackers compromised 72 extensions within one of the well-known marketplaces and infiltrated more than 150 repositories on well-known code repository service.

The malicious code used hidden Unicode characters to conceal payloads capable of stealing developer credentials, API keys, and authentication tokens.

Security teams warn that these developer-environment attacks could allow adversaries to compromise software during the build process, potentially spreading malware through legitimate updates.

State-sponsored threat groups active

Threat intelligence reports also identified multiple state-linked cyber groups conducting coordinated operations across sectors.

The advanced persistent threat group Seedworm, also known as MuddyWater was detected on networks belonging to a bank, an airport, and a defense-sector software company. Investigators say the group deployed custom backdoors known as “Dindoor” and “Fakeset” to maintain long-term access and exfiltrate data.

Meanwhile, attackers have been actively exploiting vulnerabilities in remote access infrastructure. A newly identified malware strain called RESURGE has targeted well-known virtual private network appliances by exploiting a critical software flaw tracked as CVE-2025-0282.

According to analysts, the malware embeds itself directly within the device’s web server and can survive system reboots and patching attempts unless the appliance is completely factory reset.

Critical infrastructure in the crosshairs

Energy systems, water utilities, and industrial control networks have also emerged as prime targets.

Threat actors linked to the CyberAv3ngers collective have continued to exploit vulnerabilities in programmable logic controllers used in industrial facilities. These attacks rely on default credentials to gain control of industrial equipment through protocols such as Modbus/TCP.

Security experts warn that manipulation of industrial control systems could enable physical disruption, including chemical dosing manipulation at water treatment plants or interference with fuel distribution networks.

Meanwhile, telecommunications providers face growing pressure as attackers attempt to compromise network infrastructure to intercept communications or track individuals through subscriber data.

Financial sector under pressure

Banks and payment providers have also seen an uptick in attacks, including DDoS campaigns targeting payment gateways and real-time transaction systems.

Financial institutions remain particularly vulnerable because attackers can exploit compromised vendor relationships or cloud identity systems to access sensitive financial records.

Some state-linked actors have also partnered with ransomware groups to monetise stolen access to financial networks.

To conclude urgent defensive measures

Cybersecurity leaders are urging organizations to immediately review their vendor relationships and strengthen monitoring of third-party access.

Recommended actions include auditing administrative accounts, enforcing phishing-resistant multi-factor authentication, rotating compromised credentials, and reviewing software update channels for signs of tampering.

Security teams are also advised to monitor developer environments, cloud identity systems, and operational technology networks for unusual activity.

As global tensions continue to rise, analysts and cybersecurity experts warn that cyber operations may increasingly target the digital infrastructure that underpins modern economies.

“The scale and coordination of these campaigns suggest this is not a short-term spike, but we must assume that supply chains are now a primary battlefield in modern cyber conflict.”

Who has the best intelligence and who proactively act matters, please tuned for more discussion updates…

Anoop Paudval
Anoop PaudvalHead of Information Security Governance, Risk, and Compliance (GRC) for Gulf News
Anoop Paudval leads Information Security Governance, Risk, and Compliance (GRC) at Gulf News, Al Nisr Publishing, and serves as a Digital Resilience Ambassador. With 25+ years in IT, he builds cybersecurity frameworks and risk programs that strengthen business resilience, cut costs, and ensure compliance. His expertise covers security design, administration, and integration across manufacturing, media, and publishing.
Related Topics:

Get Updates on Topics You Choose

By signing up, you agree to our Privacy Policy and Terms of Use.
Up Next