Verizon: Trusted third-party connections are the new front door for attackers

Verizon: Trusted third-party connections are the new front door for attackers

Third-Party Risk Emerges as a Top Cybersecurity Threat in 2025

The 2025 Verizon Data Breach Investigations Report reveals a sharp rise in third-party breaches, now accounting for nearly 30% of all incidents double the rate from the previous year. Once treated as a compliance formality, third-party risk has become a primary attack vector, with attackers systematically exploiting trusted connections to infiltrate secure networks.

Organizations now rely on hundreds or thousands of third-party integrations, creating sprawling ecosystems where a single weak link can compromise the entire chain. In Europe, 96% of major financial firms reported third-party breaches in the past year, while 97% were impacted through fourth parties vendors of their vendors. The problem is structural: security teams must defend environments they do not own or fully control, leaving them blind to real-time threats.

Traditional third-party risk programs built on point-in-time assessments, questionnaires, and external scoring are ill-equipped to counter modern attacks. These methods document risk but fail to detect active compromises as they unfold. By the time a breach is discovered, attackers have already moved laterally through trusted pathways, forcing organizations into reactive incident response.

The shift is driven by AI-powered adversaries, which map trust relationships, identify vulnerabilities, and launch automated, large-scale attacks in minutes. Meanwhile, enterprises accelerate third-party integrations with AI-driven workflows, expanding the attack surface faster than security teams can monitor. Manual defenses cannot keep pace with machine-speed threats.

To close the gap, organizations must adopt an intelligence-led approach, moving from periodic assessments to continuous monitoring of their extended ecosystem. Key priorities include:

  • Mapping digital and third-party exposure to understand risk.
  • Detecting reconnaissance and targeting activity at the earliest stages.
  • Hardening AI systems against manipulation and abuse.
  • Tailoring intelligence to the organization’s specific risk profile.
  • Aligning IT, security, legal, and leadership for rapid, coordinated response.

As third-party ecosystems grow and AI-driven attacks accelerate, outdated governance models are no longer sufficient. The most effective defenses will prioritize real-time threat detection and disruption, treating third-party risk not as a compliance exercise, but as a critical attack path demanding proactive, intelligence-driven security.

Source: https://www.scworld.com/perspective/trusted-third-party-connections-are-the-new-front-door-for-attackers

Verizon cybersecurity rating report: https://www.rankiteo.com/company/verizon

"id": "VER1778085829",
"linkid": "verizon",
"type": "Breach",
"date": "5/2025",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'industry': 'Finance',
                        'location': 'Europe',
                        'size': 'Major',
                        'type': 'Financial Firms'}],
 'attack_vector': 'Trusted third-party connections, fourth-party vendors',
 'date_publicly_disclosed': '2025',
 'description': 'The 2025 Verizon Data Breach Investigations Report highlights '
                'a sharp increase in third-party breaches, now accounting for '
                'nearly 30% of all incidents. Attackers exploit trusted '
                'third-party connections to infiltrate secure networks, with '
                '96% of major European financial firms reporting third-party '
                'breaches and 97% impacted through fourth parties. Traditional '
                'third-party risk programs are ineffective against AI-powered '
                'adversaries, necessitating a shift to continuous monitoring '
                'and intelligence-led security.',
 'impact': {'operational_impact': 'Reactive incident response, compromised '
                                  'trusted pathways'},
 'initial_access_broker': {'entry_point': 'Third-party and fourth-party '
                                          'vendors'},
 'lessons_learned': 'Traditional third-party risk programs (point-in-time '
                    'assessments, questionnaires, external scoring) are '
                    'ineffective against modern attacks. Organizations must '
                    'adopt intelligence-led, continuous monitoring to detect '
                    'active compromises in real time.',
 'motivation': 'Exploitation of trust relationships, lateral movement within '
               'networks',
 'post_incident_analysis': {'corrective_actions': 'Shift from periodic '
                                                  'assessments to continuous '
                                                  'monitoring, '
                                                  'intelligence-led security, '
                                                  'proactive threat detection '
                                                  'and disruption',
                            'root_causes': 'Over-reliance on third-party '
                                           'integrations, lack of real-time '
                                           'monitoring, AI-driven attack '
                                           'automation, outdated governance '
                                           'models'},
 'recommendations': ['Map digital and third-party exposure to understand risk.',
                     'Detect reconnaissance and targeting activity at the '
                     'earliest stages.',
                     'Harden AI systems against manipulation and abuse.',
                     'Tailor intelligence to the organization’s specific risk '
                     'profile.',
                     'Align IT, security, legal, and leadership for rapid, '
                     'coordinated response.'],
 'references': [{'date_accessed': '2025',
                 'source': 'Verizon Data Breach Investigations Report'}],
 'response': {'enhanced_monitoring': 'Continuous monitoring of extended '
                                     'ecosystem'},
 'threat_actor': 'AI-powered adversaries',
 'title': 'Rise in Third-Party Breaches as a Primary Cybersecurity Threat in '
          '2025',
 'type': 'Third-Party Breach',
 'vulnerability_exploited': 'Weaknesses in third-party integrations, lack of '
                            'real-time monitoring'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.