SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers
Story image

Chain IQ breach exposes UBS, Pictet & others to cyber risks

Yesterday

Prominent Swiss banking institutions UBS and Pictet, as well as engineering firm Implenia, have confirmed being affected by a significant cyberattack targeting procurement services provider Chain IQ. The breach has resulted in the leak of sensitive information belonging to thousands of employees, including high-profile executives, with some data reportedly appearing on dark web forums. Chain IQ has stated that, in addition to itself, at least 19 other companies were targeted in the incident.

The attack has cast a spotlight on third-party risk within the financial services sector, where even rigorous internal cyber defences can be undermined through external suppliers' vulnerabilities.

Ensar Seker, CISO at SOCRadar, said, "The Chain IQ breach underscores the persistent and growing risk of third-party exposure in today's interconnected enterprise ecosystem. When suppliers hold sensitive operational or financial data, even in the absence of client PII, they become a highly attractive target for threat actors seeking leverage, intelligence, or access pathways into high-value organizations.

"What's notable here is that the breach impacted major financial and consulting institutions, which typically maintain rigorous internal security controls. This demonstrates that the weakest link often lies outside the perimeter.

"From a threat intelligence perspective, leaks involving executive or employee-level data, especially those of high-profile individuals like UBS's CEO, increase the likelihood of targeted phishing, social engineering, or even impersonation attempts. Even when no client data is compromised, operational metadata like invoice histories, consultant relationships, or IT supplier engagements can provide adversaries with useful insights for crafting sophisticated campaigns.

"This is a classic case where traditional third-party risk management needs to mature into continuous fourth-party visibility and active vendor monitoring.

"Organizations must go beyond one-time assessments and require vendors to maintain threat detection telemetry, incident reporting SLAs, and breach simulation exercises. Additionally, platforms that provide real-time breach alerts on vendors such as DRP and supply chain intelligence solutions are no longer optional but essential to reduce response lag.

"Chain IQ's breach serves as yet another reminder that "trust, but verify" is not just a saying, it should be embedded into every enterprise's third-party governance model."

James McQuiggan, Security Awareness Advocate at KnowBe4, said trust alone isn't enough when it comes to third-party risk and cybersecurity.

"Organizations need to manage third-party risk actively. Don't rely on a one-time assessment or questionnaire. It's crucial to consider regularly reviewing vendors' protection of their data and systems. Keep checking in, especially with vendors that handle sensitive information. When a vendor is compromised, a quick response can be significant.

"Organizations should have a well-documented and repeatable plan for handling a third-party incident or breach. Consider how to isolate the issue, who to contact, and how to communicate with employees and partners. Rate your vendors based on risk levels: one that has strong security programs versus one that does not. Higher risk vendors require additional oversight and tighter security controls."

Chain IQ's breach has also revived concerns about the adequacy of traditional third-party audit processes. Continuous, real-time monitoring via digital risk protection (DRP) tools and supply chain intelligence platforms are now seen as essential for early breach detection and to minimise response delays. The incident has again demonstrated that breaches can reverberate through complex supply chains, affecting dozens of companies in succession.

Andrew Costis, Engineering Manager of the Adversary Research Team at AttackIQ:

"Swiss banking institutions UBS and Pictet have reported breaches of data that have leaked information pertaining to thousands of company workers. The data was stolen through a cyberattack on business service company Chain IQ, which claimed that it and 19 other companies were targeted in the attack.

"Cyberattacks on financial institutions have increased dramatically, often resulting in the destruction or exposure of highly sensitive data, which can lead to potential ransom demands or threats. Additionally, even when institutions have security defenses in place, they're often underprepared or overwhelmed by unfamiliar attack tactics.

"Organizations must take steps to get ahead of attacks regardless of the manner in which they are initiated. Adversarial exposure emulation can fortify defenses and ensure they're not caught off guard. By emulating the tactics, techniques, and procedures that advanced threat actors utilize, organizations can proactively prepare their defenses for real-world attack scenarios, which helps to assess and improve their defenses against similar adversarial behaviors."

With the financial and consulting sector reliant on a vast web of service providers, the Chain IQ incident is a powerful reminder that cybersecurity is only as robust as the ecosystem's most vulnerable point. Experts are urging organisations to adopt a holistic approach to security, making continuous oversight, simulation-based testing, and real-time threat intelligence core components of their vendor management.

While UBS, Pictet, and Implenia have not confirmed the precise nature or volume of data exposed, the impact of operational information loss has prompted fresh calls for coordinated action on supply chain cyber risks. Investigations are ongoing, with authorities and affected firms working to contain secondary consequences such as targeted phishing campaigns and potential fraud.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X