Skip to main content

Incident story · Supply-chain compromise

The dispatch software vendor pushed an update. It also pushed a backdoor.

The owner of a $60M regional trucking and warehousing firm in the Mid-Atlantic got the news in the worst possible way — a competitor sent him a link. His firm's dispatch logs, customer contracts, driver personal information, and rate-sheet history were sitting on a dark-web forum. The intrusion had happened eight weeks earlier through a routine software update from the firm's long-time TMS vendor. The vendor's SOC 2 had not protected him. His firewall had not protected him. His EDR had not protected him. The vendor's build pipeline had been compromised; the attacker had simply waited for the next signed release to push the backdoor to every customer at once.

By Stefan Efros, CEO & Founder, EFROSReviewed by Daniel Agrici, Chief Security Officer, EFROS
Reviewed by CSO ·

At a glance

The shape of the incident

Industry / scaleRegional trucking + warehousing · 2 facilities · US Mid-Atlantic · $60M revenue · 85 employees
Attack typeSupply-chain compromise — backdoored TMS software update from a trusted vendor
Time to detection8 weeks (data appeared on a dark-web forum)
Total estimated cost$8.9M (lost contracts + investigation + DOT audit + remediation)
Recovery time9 months to operational stability · 14 months for the DOT audit close
Cyber insurance recovery~22% of total ($1.95M of $8.9M)

What happened

One update, eight weeks of quiet, then the competitor's phone call

The vendor and the update. The firm had used the same transportation management system for nine years. The vendor was a mid-sized US software company with a SOC 2 Type 2, a vendor risk questionnaire on file, and a long track record of clean updates. On a routine Wednesday, the vendor pushed version 7.4 of the admin tool to every customer environment. The update was digitally signed by the vendor. It installed without incident.

What the firm did not know. Three weeks earlier, an attacker had compromised the vendor's build environment via a developer's stolen credentials. The attacker waited for the next release cycle and inserted a backdoor into the admin tool. When 7.4 went out, the backdoor went with it — signed, sealed, distributed to every customer in the vendor's installed base.

Weeks one to four — quiet recon. The backdoor allowed the attacker to authenticate as the TMS service account, which had broad access on the firm's network because the TMS itself needed to read from accounting, HR (for driver records), and the customer contract database. The attacker pulled dispatch logs going back two years, the full active customer contract file, the driver master list with Social Security numbers and CDL data, and the firm's rate sheet history.

Weeks five and six — exfiltration. The attacker exfiltrated approximately 14 gigabytes of data over a two-week window, in small chunks during low-traffic hours, disguised as TMS replication traffic to the vendor's cloud. The firm's EDR did not flag it because the traffic looked exactly like normal TMS behavior — that was the point of compromising the TMS vendor.

Week eight — the competitor's call. On a Tuesday morning, a competing logistics firm's owner called the affected firm. He had been browsing a dark-web threat intelligence feed his MSSP shared with him, and he had recognized the affected firm's customer names and rate sheets in a fresh dump. He passed along the link as a professional courtesy. Within an hour the firm was on the phone with breach counsel and the FBI.

Days 1 to 4 — the vendor goes silent. The firm contacted the TMS vendor. The vendor confirmed they were aware of the compromise — they had been investigating for eleven days — and had not yet notified customers. The firm asked when notification was coming. The vendor's general counsel said they were "working on language." The firm's contract had no breach notification SLA.

Week 2 — anchor customer notifications. The firm pre-empted the vendor and notified its own customers directly. Two of the top five shippers — one a Fortune 500 retailer, one a regional grocery chain — both sent formal breach inquiries within 48 hours. Both began evaluating alternative carriers within a week.

Week 6 — DOT inquiry. Because the dump included driver personal data and Hours-of-Service records, the FMCSA opened an inquiry into the firm's data handling practices. What started as an inquiry became a full audit when the agency discovered the firm had no documented vendor risk management program.

Month 6 — the non-renewal letters. The Fortune 500 retailer did not renew at all. The grocery chain renewed at 40 percent reduced volume, citing "risk diversification." Combined, the two represented approximately $8M of trailing ARR. The DOT audit closed at month 14 with a corrective action plan and no penalty.

What it cost

The bill, itemized

Line item
Amount

Lost ARR — two anchor shipper contracts did not renew

$8,000,000

Two of the firm's top five customers cited the breach in their non-renewal letters. One stayed with a 40% volume reduction; one left entirely.

DFIR + supply-chain forensic investigation

$340,000

Identify the backdoor mechanism, trace lateral movement, determine what data left the environment, coordinate with the vendor and other affected customers.

DOT compliance audit response

$185,000

Audit triggered by exposure of driver PII and Hours-of-Service data. Document production, on-site visits, corrective action plan.

Customer notification + contractual breach response

$210,000

Notification letters to every shipper whose contract data was in the dump. Renegotiation costs and discount concessions on retained accounts.

Environment rebuild + vendor risk program

$220,000

Replace TMS, rebuild network segmentation, deploy EDR across fleet management infrastructure, third-party risk register and assessment program.

Cyber insurance premium increase (3-year)

$165,000

Premium up 180% YoY; carrier required attestation of vendor risk management program at renewal.

Cyber insurance recovery

($1,950,000)

Covered investigation and portion of revenue loss within the policy sub-limit. Did not cover all ARR loss.

Net to the firm

~$6,970,000

Mostly trailing revenue loss as the contracts expired. Owner financed remediation with a credit line and a 14-month draw freeze.

What we did

EFROS-style response — what an engagement looks like

Day 1 — confirm and contain. We confirm the dump on the dark-web forum is real, scope what is there (customer names, contract terms, driver PII, rate sheets), and isolate the TMS environment from the rest of the network. We pull the TMS off the network while keeping operations running on manual dispatch workflows.

Days 2 to 7 — full scope forensics. We work backwards from the dump to identify the exact moment of first compromise, every system the TMS service account touched, and every piece of data that left the environment. We coordinate with the vendor — through counsel — to get details of the build pipeline compromise, since the vendor's evidence drives the customer notification scope.

Week 2 — pre-empt vendor disclosure. The vendor is going to disclose eventually. The firm's customers are going to find out. We notify customers directly with what is known, in plain language, with breach counsel on every word. The owner's name goes on the letter; the message is short, factual, and gives customers a contact and a timeline. We do not wait for the vendor.

Weeks 3 to 8 — DOT response and vendor risk program. We build the vendor risk register the firm did not have: every vendor, what data they touch, what notification SLA exists, when the next attestation is due. We segment the network so no future TMS or ERP compromise can reach the accounting system or HR system. We respond to FMCSA through counsel.

Months 2 to 9 — customer retention and contract renegotiation. The owner spends months on the road meeting with shippers in person. We provide the technical evidence package — what was breached, what the new controls are, what notification SLA we now contractually require from every vendor — so the owner can answer the question every shipper asks: prove it will not happen again.

Ongoing. Quarterly vendor risk reviews. Annual vendor attestation cycle. Network segmentation tested quarterly. Dark-web monitoring for the firm's customer names and rate-sheet fingerprints.

What you should take from this

Five things to do this week

  • 01

    Supply-chain attacks bypass everything you have done. The firm had EDR, MFA, backups, employee training. None of it mattered. The attacker came in through a signed, vendor-pushed software update that the customer had every reason to trust.

  • 02

    A vendor's SOC 2 does not protect the customer. It tells you the vendor has documented controls, audited. It does not tell you the vendor's build pipeline is clean today. SOC 2 is a starting question, not a finishing answer.

  • 03

    Third-party risk management is a register, not a one-time questionnaire. A list of every vendor with access to your systems or data, what they can reach, what notification they owe you on a breach, when their attestations expire, and how you would replace them.

  • 04

    Vendor breach notification needs to be in writing before you sign. The firm had no contractual SLA on the TMS vendor for breach notification — when the vendor learned about the backdoor, they spent eleven days deciding how to communicate it.

  • 05

    Network segmentation is the difference between 'a vendor compromised our dispatch tool' and 'a vendor compromised our entire environment.' The TMS lived on the same network segment as the firm's accounting system, HR system, and email — there was no boundary to slow the attacker down.

The 60-second self-check

Three yes/no questions

If any answer is no — or any answer is "I think so" — you have the same exposure profile as the logistics firm in this story.

1. Do you have a written list — not in someone's head — of every software vendor that has access to your data or your network, and what data each one can reach?

If it lives in IT's memory, it does not exist for risk management purposes.

2. If your most critical software vendor was breached tonight, would you find out from the vendor — by contract, within a defined number of days — or would you find out from a customer or a news article?

Check your contracts. Most have no breach notification SLA at all.

3. If a vendor pushed a malicious update to your environment, would your network architecture limit what they could reach, or would they have line of sight to everything?

This is segmentation. Not firewall rules — actual separation between vendor-touching systems and your crown jewels.

What this would cost you

Three private numbers, none of them require talking to a salesperson.

Names, locations, and identifying details changed. Numbers represent typical ranges from EFROS engagements; specific cases vary. Nothing on this page is legal advice.