IJISC
  • Indexed in

  • Latest News

    December 24, 2025
    Volume 14, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2025
    Volume 14, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies


    Author(s): STĂNCIULESCU, Adelaida; BACIVAROV, Ioan

    Quick view | Full article | Citations | Views: 357


    Author(s) keywords: , , , , ,


    Reference keywords: , ,


    Abstract:

    The year 2025 marked a significant increase in software supply attacks chain, highlighting a strategic shift in the way the malicious actors operate. Unlike previous years, the 2025 incidents demonstrated a clear focus on compromising critical development infrastructures, cloud service providers, and open -source ecosystems with global impact. This article performs a comparative analysis of the main major software supply incidents chain reported in 2025, examining attack vectors, propagation mechanisms, operational impact, and implications for current software security models.



    References:

    [1]. CW Ten, “Software supply chain attacks: taxonomy and analysis," in Proc. IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 2022, pp. 112-126.
    [2]. SE Simion and R. Chinchani, "Trends in software supply chain threats," IEEE Security & Privacy, vol. 21, no. 3, pp. 28-37, 2024.
    [3]. Microsoft Security, “CI/CD supply chain attacks observed in 2025," 2025. Online. Available: https://www.microsoft.com/security.
    [4]. Google Security Team, “Build system compromise and mitigations," 2025. Online. Available: https://security.googleblog.com.
    [5]. J. Cappos et al., "On the security of modern software distribution,” ACM CCS, New York, NY, USA, 2023, pp. 85-99.
    [6]. ENISA, ”Threat landscape for supply chain attacks," 2025. Online. Available: https://www.enisa.europa.eu.
    [7]. M. Kuppinger, ”Abuse of enterprise software updates,” Computers & Security, vol. 131, pp. 103-118, 2025.
    [8]. CISA, “Software supply chain incident response guidance," 2025. Online. Available: https://www.cisa.gov.
    [9]. AZ Wang, "Comparative study of supply chain compromises," in Proc. NDSS, San Diego, CA, USA, 2024, pp. 201-215.
    [10]. NIST, Secure Software Development Framework (SSDF), SP 800-218, Gaithersburg, MD, USA, 2025.
    [11]. B. Kitchenham et al., ”Governance challenges in secure software supply chains," IEEE Software, vol. 41, no. 1, pp. 52-60, 2025.
    [12]. ISO/IEC 27005, Information technology - Security techniques - Information security risk management, International Organization for Standardization, 2018.
    [13]. MITRE, Common Vulnerabilities and Exposures (CVE) and CVSS v3.1 Specification, MITRE Corporation, 2019.



    Additional Information

    Article Title: Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies
    Author(s): STĂNCIULESCU, Adelaida; BACIVAROV, Ioan
    Date of Publication: 2025-12-24
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2025.02.03
    Issue: Volume XIV, Issue 2, Year 2025
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 32-38 (7 pages)



    Copyright ©2012-2026
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.