25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

More Than One-Third of Data Breaches Due to Third-Party Supplier Compromises

Cyber actors are increasingly exploiting vulnerabilities at vendors, suppliers, and software providers to infiltrate the networks of organizations. According to a recent report from SecurityScorecard, at least 35.5% of all data breaches in 2024 originated from third-party compromises, up 6.5% from 2023. The number of data breaches stemming from third parties is likely higher since the third-party component of data breaches is not always disclosed.

The Global Third Party Breach Report is based on data collected by SecurityScorecard’s STRIKE Threat Intelligence Unit from organizations in multiple sectors. Third-party breaches are classed as breaches that originated at a vendor, supplier, or partner, with the attackers pivoting to infiltrate the networks of business-to-business customers, and where data from one organization is compromised while in the custody of a third party.

A majority of the breaches were reported by entities in North America, which accounted for 59% of data breaches and 53% of third-party breaches. Healthcare, pharmaceuticals, and biotechnology firms had the highest volume of third-party breaches (22%), although these sectors had the highest number of breaches overall. Across the 1,000 data breaches included in the dataset, 242 occurred in healthcare, pharmaceuticals, and biotechnology firms, almost double the number of breaches in the second most targeted sector – government, defense, and aerospace.

In healthcare, 32.2% of all data breaches involved compromises at third parties, a lower percentage than in several other industry sectors. This is not because healthcare organizations are better at protecting against third-party data breaches, but because organizations in this sector are often attacked directly. Healthcare organizations are viewed as easy targets due to perceived weaker security than other sectors, lower downtime tolerance, and they store high volumes of sensitive and valuable data. The high number of direct attacks indicates hackers do not need to conduct more complex attacks on vendors, as there are ample opportunities to attack these organizations directly.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Ransomware actors and other extortion groups are increasingly targeting supply chains, with 41.4% of incidents having a third-party component. Cl0p is by far the most prolific threat actor in this category due to the mass exploitation of vulnerabilities in third-party file transfer solutions. Other threat groups that were highly active last year include RansomHub, which has grown into the most dominant ransomware group following the shutdown of the AlphV/BlackCat ransomware group and law enforcement operations disrupting the LockBit ransomware group.

In 2023, 75% of third-party breaches involved technology products; however, in 2024, threat actors diversified, with only 46.75% of breaches involving technology products. File transfer software was the top breach enabler (14%) due to the exploitation of vulnerabilities in Cleo software by the Cl0p group, followed by breaches of cloud products and services (8.35%). While the technology used by multiple industry sectors was much more likely to be targeted, products and services specific to healthcare and financial services were involved in 27.5% of third-party breaches, similar to 2023. In healthcare, the most common industry-specific attack vectors were pharmaceutical distribution and clinical trial support vendors (7%), healthcare administrative and management services (4.25%), and healthcare software, mobile apps, and telehealth services (2%).

SecurityScorecard recommends prioritizing supply chain security, including demanding secure-by-design technology and hardening high-risk infrastructure, especially file transfer software, cloud infrastructure, VPN solutions, and healthcare-specific services.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist