A methodical, source-driven briefing on how software supply chain attacks have changed since SolarWinds and Log4Shell and what to investigate next

Roberto Investigator
Investigative lead
After SolarWinds and Log4Shell, the landscape of software supply‑chain risk changed for good. Those two wake‑up calls forced governments, vendors and defenders to rethink how they track dependencies, inspect build systems and share telemetry — but they didn’t solve the problem.
This report pulls together public advisories, vendor postmortems and independent analysis to show what actually shifted in attacker tradecraft, where defenders still struggle, and what should come next.
What we reviewed
– Public advisories from CISA and other national CERTs
– NVD/CVE records (notably CVE‑2021‑44228 / Log4Shell)
– Vendor incident reports and technical postmortems
– Independent forensic write‑ups and threat research
High‑level findings, fast
– Attack vectors: adversaries weaponized trusted update channels and widely reused libraries.
– Detection: many organizations still lack the telemetry granularity needed for quick attribution and containment.
– Response: guidance now blends static patching with runtime monitoring, dependency inventories and SBOMs, but adoption is uneven.
– Coordination: public–private collaboration improved, yet classified or commercial data silos block faster, broader remediation.
How the incidents changed things
SolarWinds taught defenders that build systems are high‑value targets: compromise a vendor build and you can reach thousands of downstream customers. Log4Shell showed the danger of a single ubiquitous library — one remote‑code‑execution bug, massive reach. The pattern after both incidents was similar: emergency advisories → rapid patching → iterative detection guidance → emphasis on SBOMs and runtime validation.
The evidence in practice
Across the sources we reviewed:
– Forensics repeatedly point to initial access via build systems or unpatched third‑party components.
– Post‑exploitation behavior follows a predictable arc: lateral movement, credential harvesting, then targeting high‑value systems.
– Where defenders had centralized logging and high‑fidelity telemetry, containment was faster; where logs were siloed or incomplete, detection lagged.
Actors and roles
– Adversaries: state‑linked groups, criminals and opportunists exploiting supply‑chain vectors for espionage or theft. Public attributions are cautious and rely on hard indicators.
– Vendors & maintainers: commercial vendors, open‑source projects and CI/build providers — systems here are common initial footholds.
– Defenders: national CERTs, CISA, vendor CSIRTs, managed security providers and independent researchers driving detection, disclosure and mitigation.
Operational implications
– Inventory matters: SBOMs and software composition analysis are essential to map exposure quickly.
– Build integrity: signing, reproducible builds and hardened CI/CD reduce insertion risks.
– Runtime controls: patching alone isn’t enough — runtime monitoring, allowlists and behavior detection shorten the window of exploitation.
– Long‑tail risk: legacy systems and unmaintained components keep vulnerabilities alive long after initial patches.
Where organizations typically fail
– Poor visibility into third‑party dependencies
– Fragmented telemetry and siloed logs that block correlation
– Procurement that doesn’t enforce build‑security requirements
– Slow or inconsistent patch adoption across downstream users
What to expect next
– More vendor transparency around build pipelines and SBOMs.
– Increased automation in dependency analysis and SBOM verification.
– Sharper procurement rules: contracts will start to require build controls and SBOM delivery.
– Ongoing cross‑sector threat‑sharing exercises to reduce detection lag.
– Regulatory and insurance scrutiny focused on supply‑chain exposures.
Practical recommendations (short list)
– Start with an accurate SBOM for your critical apps and services.
– Harden CI/CD and supply‑chain tooling: treat build systems as crown jewels.
– Centralize and normalize telemetry so indicators from different sources can be correlated in real time.
– Combine static fixes (patches/SBOMs) with runtime defenses (process allowlists, network segmentation, anomaly detection).
– Build playbooks for supplier incidents: isolation steps, notification chains and rollback plans.
What we reviewed
– Public advisories from CISA and other national CERTs
– NVD/CVE records (notably CVE‑2021‑44228 / Log4Shell)
– Vendor incident reports and technical postmortems
– Independent forensic write‑ups and threat research0
What we reviewed
– Public advisories from CISA and other national CERTs
– NVD/CVE records (notably CVE‑2021‑44228 / Log4Shell)
– Vendor incident reports and technical postmortems
– Independent forensic write‑ups and threat research1
What we reviewed
– Public advisories from CISA and other national CERTs
– NVD/CVE records (notably CVE‑2021‑44228 / Log4Shell)
– Vendor incident reports and technical postmortems
– Independent forensic write‑ups and threat research2
Roberto Investigator — investigative lead
What we reviewed
– Public advisories from CISA and other national CERTs
– NVD/CVE records (notably CVE‑2021‑44228 / Log4Shell)
– Vendor incident reports and technical postmortems
– Independent forensic write‑ups and threat research3




