Supply Chain Attack Response Quickstart
Time-boxed response path for a compromised software vendor or third-party library. Moves from vendor-advisory ingestion through blast-radius estimation, package rollback, and malicious-payload analysis. Emphasizes separating "package present" from "payload executed" from "attacker infrastructure contacted".
First 15 Minutes
Ingest Vendor Advisory and IoCs
CriticalPull the vendor advisory and record the exact affected product name, affected version range, published IoCs (file hashes, C2 domains, C2 IPs, certificate thumbprints), and earliest known malicious release timestamp. If the advisory is incomplete, request private IoC sharing through an ISAC or trusted vendor channel under NDA. Do not wait for a public disclosure to begin scoping.
Fast IoC Sweep Across Estate
CriticalRun a first-pass sweep across the estate for vendor-published hashes and C2 indicators. Focus on the fastest-return sources first: EDR file-event index for hashes, proxy and firewall logs for outbound C2 domains and IPs, DNS logs for resolution hits. The goal at this stage is breadth, not depth -- confirm whether you have any hits before investing in deeper scoping.
Activate Incident Bridge
CriticalConvene a bridge with security, platform/SRE, application engineering, vendor management, and legal. Designate a single scope lead and establish a single affected-asset inventory; avoid parallel team-by-team lists that diverge over the next hours. Publish the vendor-advisory version being followed so everyone tracks the same source.
First 60 Minutes
Query SBOMs and Internal Registries
CriticalQuery SBOMs (Syft, Trivy output) and package-manager manifests across build systems and runtime hosts for the affected package and version range. Query internal artifact registries (JFrog, Nexus, internal PyPI/npm mirrors, ECR/GCR/ACR) for download counts and upload timestamps of the affected package. Produce a first-pass affected-asset list within this step.
Separate Installed from Executed
CriticalA package present in node_modules or in a Docker image layer does not necessarily mean the malicious payload ran. Query EDR process-creation events for the malicious hashes (not only file events) to identify hosts where the payload actually executed. Query outbound network events for C2 contact to identify hosts that the payload reached out from. These three cohorts have very different response requirements.
Freeze CI/CD Pipelines
CriticalFreeze CI/CD pipelines that could redeploy infected containers or re-install the compromised package version: disable auto-deploy on affected repositories, add a temporary admission check that rejects images built from the malicious release window, and block the malicious versions in internal package registries with deny rules.
First 4 Hours
Rollback to Verified Safe Version
CriticalPin a verified safe version in package manifests and lockfiles across affected services. Sequence rollback: customer-facing production first, internal production second, non-production last. Coordinate with SRE on blast radius; a panicked rollback to an older vulnerable version makes the incident worse. Track rollback status in a live dashboard, not in a chat thread.
Quarantine Malicious Artifact for Analysis
CriticalBefore removing the malicious artifact from hosts and registries, copy the binary, its config, and any dropped persistence artifacts to a chain-of-custody evidence store with hashes. Do not silently delete the malicious artifact from internal registries; mark it blocked and preserve a forensic copy. Analysis starts from this preserved copy, not from a re-download.
Rotate Signing Material if Compromised
If the attacker had access to signing material (code-signing keys, Cosign keys, Authenticode certificates, timestamp-authority keys), revoke the compromised key and rotate to a new one. Publish the revocation through internal and external channels. This may break unrelated legitimate workloads; coordinate with platform engineering before pulling the trigger.
Kick Off Payload Analysis
Begin static and dynamic analysis of the quarantined malicious artifact in an isolated lab environment with fake network services (INetSim, FakeNet-NG). Identify trigger conditions, capabilities (credential access, persistence, network I/O), and IoCs for hunting. Share extracted IoCs with detection engineering immediately; do not wait for full analysis completion.
DFIR Assist — Supply Chain Attack Response Quickstart Quickstart | Printed 4/19/2026