Third-Party Risk: When Ransomware Walks in Through the Side Door
News and information from the Advent IM team.
The Collins Aerospace incident is another reminder that third-party risk is no longer an abstract concept; it is one of the most common ways attackers get inside. In this case, the compromise wasn’t a direct assault on an enterprise perimeter but a ransomware attack that entered via the supply chain. Not only was data disrupted, but demands were made for payment — a pattern that is becoming increasingly common when adversaries exploit vendor access.
For organisations in defence, government, aerospace and critical infrastructure, this is a wake-up call: your own controls may be strong, but the weakest supplier in your chain can still bring you down. Attackers know this. They deliberately target vendors, integrators and service providers because these channels offer indirect access and the potential for wide-scale disruption.
Ransomware as the New Normal in Supply Chain Attacks
When bad actors gain access via a third party, the playbook has shifted. It is not just about infiltration; it is about extortion. Attackers encrypt data, exfiltrate it, and demand payment — often threatening disclosure or operational chaos to increase the pressure. Often they sell the data on anyway, regardless of payment and payment is never a guarantee of getting your data or system back, because after all, they are criminals!
Recent data shows how sharply this trend is growing:
The Collins Aerospace case is just one high-profile example, but the data shows this is systemic.
What Boards and CISOs Should Be Asking
To respond effectively, third-party assurance needs to move away from being a compliance afterthought and into the heart of risk governance. Some critical questions:
The Broader Business Impact
This is not just an operational concern for security teams. A breach via a third party can:
The Collins Aerospace incident should reinforce the message that attackers will continue exploiting supply chains until organisations stop treating third-party risk as a tick-box exercise. Ransomware and extortion have amplified the stakes, making this as much a board-level issue as an operational one.
Third-party risk is enterprise risk. Treating it with the same seriousness as internal controls is now essential for resilience. That means deeper due diligence, continuous monitoring, enforceable contractual measures, and above all, designing networks and processes to withstand compromise when (not if) it occurs.
The breach pathway is no longer just the front door. Increasingly, it’s the supplier side door — and too often, it comes with a ransom note attached.
Written by Ellie Hurst, Commercial Director.