From gbhackers.com
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the vendor, partner, or supplier network.
Threat actors can enter the target firm by distributing malware, influencing software upgrades, and gaining illicit access by breaching a reliable party in the supply chain.
Recently, cybersecurity researchers at Oversecured a supply chain attack, which is dubbed “MavenGate,” which let threat actors hijack Java and Android apps.