LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

6 Steps to Counter Fourth-Party Supply Chain Vendor Attacks

Managing a cybersecurity program is hard, but also very meaningful, work.

Continuously managing the cybersecurity posture of your organization’s supply chain vendors can at times feel near impossible, afterall ensuring the cybersecurity of your suppliers is an order of magnitude leap in difficulty.

Yet, criminals are demonstrating that despite these difficulties, this task requires our immediate attention, given the trending success in exploiting our businesses' trusted relationships.

Now, before you go and say, “But Kory, my company only makes golf balls. How many layers of suppliers do I need to worry about?”

The answer is not necessarily all of them, but you must single out which of your suppliers’ suppliers could pose a danger. A golf ball manufacturer might be able to get the vendor supplying the machine that produces the synthetic rubber core to provide its security details, but find it more difficult to do the same for the machine’s software provider, and then for its vendors.

To help organizations climb this difficult mountain, let’s go through six frequently asked questions that will help us better understand this deeper level of supply chain attack.

So, what can one do?

 

1. Let’s start with something simple. What is the difference between a third-party risk and a fourth-party risk?

A third-party risk is a threat from a company you have some type of direct contract with, say a vendor, or a partner, and that party has a connection to your system. This is a traditional supply chain risk that companies manage through vendor risk assessments and contract clauses.

A fourth-party risk is one step removed. It's the risk posed by your third-party vendor's vendor. You don't have a direct relationship with that organization, so you lack visibility and control. This means any security issues they have could be passed along and impact your business.

For example, your company might use a third-party payroll service. That payroll service, in turn, may use a fourth-party cloud provider to store its data, including your employees' sensitive information. If that cloud provider suffers a breach, your company is still on the hook for the exposed data.

Trustwave Managed Vendor Risk Assessment protects against third & fourth-party risks.

Watch the Video

2. Are fourth-party attacks common?

Yes, they're becoming more common, and their impact is often amplified due to the lack of visibility. One recent report noted that 4.5% of all breaches are through fourth-parties, while 35.5% of all breaches in 2024 were third-party related, a 6.5% increase from 2023.

There is another way to look at it, too. Every fourth-party breach is another firm’s third-party breach.

While we've seen a lot of attention on third-party breaches, like the recent SalesLoft attack that impacted Salesforce and other businesses, fourth-party incidents are often harder to detect and attribute.

 

3. Can you point to an attack on a fourth-party supplier that impacted the primary organization?

One notable example is from 2023, when the Cl0p ransomware/extortion group exploited a zero-day vulnerability in the MOVEit file transfer platform, affecting thousands of organizations worldwide.

In this case, the chain reaction started with Wilton Reassurance, a life insurance company. It was indirectly impacted when its third-party service provider, PBI Research Services, used MOVEit to process customer data. Due to the MOVEit breach, confidential information of nearly 1.5 million consumers was compromised.

This indirect entry point allowed the attackers to move laterally through Target's network, ultimately gaining access to the point-of-sale systems and stealing the credit card information of millions of customers. This incident was a wake-up call for many organizations, highlighting the critical importance of looking beyond their immediate suppliers.

 

4. How far down the supply chain does a company have to worry about when considering its own security posture?

In reality, you need to be concerned about security as far down the supply chain as your critical data or operations flow. While it's impractical to vet every single vendor, you must focus on the vendors that pose the greatest risk. These are typically the ones with "special access", such as those that:

  • Handle or store sensitive data (customer information, intellectual property, financial records).
  • Have direct access to your internal networks or critical systems.
  • Provide a service that is essential to your business operations.

These vendors' vendors should be a primary concern because a compromise at that level could have a direct and devastating impact on your organization.

 

5. Is it feasible to investigate that far down the supply chain for risks, and if so, how does one do so?

Investigating risks that far down the supply chain is challenging, but it's not impossible. It requires a strategic and methodical approach. Mapping your supply chain to identify your most critical third-party vendors and then determining which fourth parties they rely on most heavily. This can be accomplished by:

  • Asking the right questions in your vendor due diligence questionnaires. Explicitly ask third parties to disclose their key subcontractors and their security practices.
  • Requesting relevant reports, such as SOC 2 reports, from your third-party vendors. These reports often contain information about the vendors' own third-party relationships.
  • Utilizing automated tools that can provide real-time visibility into your vendors' security postures and alert you to potential vulnerabilities or breaches in their supply chain.

 

6. How can Trustwave, A LevelBlue Company, help with vetting vendors?

Trustwave has a well-established, human-led Managed Vendor Risk Assessment solution that was named a representative vendor in the 2025 Gartner® Market Guide for Third-Party Risk Management Technology Solutions.

The solution is designed to reduce staff time spent vetting suppliers, support procurement decisions with actionable insights, and compare vendor security postures to help executives choose the most secure suppliers.

Once our fast onboarding process is completed, clients' Trustwave will:

  • Conduct the initial setup in the cloud platform
  • Hold workshops to ensure alignment of our delivery process and your risk management program
  • Fully remote delivery of assessments, completed within the service duration timeframe.

The bottom line is that supply chain security is possible, but it does require burrowing down many layers to uncover potential security flaws. This task is not easy, so do not be shy to seek out expert help.

About the Author

Kory Daniels is CISO at Trustwave. For more than 5 years, Kory has led people, process, and technology in effectively adopting ML, AI, and automation in Fortune 500 companies and adapting those approaches for the market. Follow Kory on LinkedIn.

ABOUT TRUSTWAVE

Trustwave, A LevelBlue Company, is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo