Skip links

Table of Contents

What is a Third-Party Data Breach? What You Need to Know

A third-party data breach happens when a vendor, supplier, or partner with access to your data gets compromised. At least 36% of all data breaches in 2024 originated from third parties. These incidents cost an average of $4.91M each and take longer to detect than direct attacks. You can be a victim without ever being the target.
⚡ TL;DR
  • A third-party data breach happens when a vendor, supplier, or partner with access to your data gets compromised.
  • At least 36% of all data breaches in 2024 originated from third parties (SecurityScorecard, 2025).
  • Third-party breaches cost an average of $4.91M per incident and take longer to detect than direct attacks.
  • In 2025, one third-party compromise hit an average of 5.28 downstream companies. You can be a victim without being the target.
  • Prevention requires continuous vendor monitoring, contractual security standards, and a clear incident response plan.

In January 2024, AT&T discovered that 109 million subscriber records had been exposed. Their systems were never directly attacked. A third-party cloud vendor had been compromised, and AT&T’s data went with it.

That is a third-party data breach: a cybersecurity incident that originates outside your organisation but reaches your data through a vendor, supplier, contractor, or partner who had legitimate access.

In 2024, at least 36% of all data breaches traced back to a third party. The real number is likely higher. Many companies never confirm the third-party connection publicly. This guide explains how these breaches work, why they are so hard to detect, and what you can do to reduce your exposure.

36%of all data breaches in 2024 originated from third parties (SecurityScorecard, 2025)
$4.91Maverage cost of a third-party data breach (IBM, 2025)
73 dayslonger detection time for third-party vs first-party breaches (Black Kite, 2025)

What Is a Third-Party Data Breach?

A third-party data breach occurs when an attacker compromises a vendor, service provider, or partner, then uses that access to reach the data of one or more of that vendor’s clients.

You did not get attacked. Your vendor did. But your customer records, employee data, or intellectual property were sitting in their systems. Now they are exposed.

It is also called a supply chain attack, a value-chain attack, or a backdoor breach. The target is often chosen specifically because it serves dozens or hundreds of organisations. One compromise, many victims.

First-Party vs. Third-Party Data Breach: What Is the Difference?

Most organisations think of data breach prevention in terms of their own perimeter. Firewalls, access controls, employee training. Third-party breaches bypass all of it.

First-Party BreachThird-Party Breach
Where it happensInside your own systemsAt a vendor, supplier, or partner
Who is attackedYour organisation directlyA third party that holds your data
Detection timeAverage 194 days (IBM, 2024)Up to 73 days longer than first-party (Black Kite, 2025)
Average cost$4.44M global average (IBM, 2025)$4.91M (IBM, 2025)
Who controls the fixYouThe vendor, not you

The $4.91M average cost of a third-party breach exceeds the overall average of $4.44M. Harder to detect, harder to contain, and harder to control because the fix is in someone else’s hands.

Why Third-Party Data Breaches Are Getting Worse

In 2025, third-party breach incidents reached record levels. Black Kite tracked 136 major third-party breach events that year, affecting 719 named companies and an estimated 26,000 additional downstream victims who were never publicly identified.

98% of organisations have at least one third-party vendor that has suffered a data breach (Spacelift, 2025). Vendor exposure is not a hypothetical. It is the current state of your supply chain.
1

Vendors Hold Enormous Amounts of Sensitive Data

Cloud providers, payroll processors, IT managed service providers, and SaaS platforms all hold sensitive data on behalf of hundreds or thousands of clients. A single compromise at any one of them creates a multi-organisation breach. The attacker gets one entry point and touches thousands of datasets.

2

Third-Party Security Is Harder to Verify

You can audit your own systems. Auditing every vendor you work with, at the depth required to catch real vulnerabilities, is an entirely different challenge. Most organisations rely on annual questionnaires or SOC 2 reports. Neither catches the vulnerabilities attackers are actively exploiting.

3

Detection Takes Longer

The median disclosure delay for third-party breaches in 2025 was 73 days. That is 73 days between a vendor being compromised and your organisation being told. During that window, your data is already exposed and attackers are already using it.

How Third-Party Data Breaches Actually Happen

Software Supply Chain Attacks

Attackers compromise software updates, libraries, or build pipelines used by the target vendor. The malicious code ships to every client automatically. SolarWinds and the 3CX breach in 2023 both used this method. The client installs an update and receives malware alongside it.

File Transfer Software Exploitation

File transfer tools are high-value targets because they move sensitive data across organisations at scale. In 2024, file transfer software was the top third-party breach enabler, accounting for 14% of incidents, primarily through exploitation of Cleo software by the Cl0p ransomware group.

Compromised Vendor Credentials

Attackers steal login credentials belonging to vendor employees. They use those credentials to authenticate into client systems, pivot through networks, and exfiltrate data. This is particularly common where vendors have direct system access for support or maintenance.

Misconfigured Cloud Storage

A vendor misconfigures an S3 bucket, an Azure blob, or a database and exposes client data to the internet. No sophisticated attack required. The data is simply accessible. The organisation whose data is stored there is the victim, but they had no visibility into the vendor’s cloud configuration.

5 Recent Third-Party Data Breaches (2024 to 2025)

These are not hypotheticals. Each of these incidents happened to well-resourced organisations with established security programmes. The common thread: a trusted vendor was the entry point.

Panera Bread
February 2026 Food & Beverage 5.1M customer accounts

ShinyHunters stole customer data and leaked a 760 MB archive after extortion failed. Exposed data included names, email addresses, phone numbers, and physical addresses. The attackers originally advertised 14 million records, though analysis from “Have I Been Pwned” confirmed 5.1 million unique accounts. Panera reported notifying authorities while investigating the access path.

Key lesson: Extortion failures lead to public data dumps. Once data leaves your vendor’s environment, you have no control over where it ends up.
Odido
February 2026 Telecommunications Up to 6.2M customers

Attackers breached a customer contact system over the 7 Feb 2026 weekend. Exposed data included names, addresses, email addresses, mobile numbers, IBANs, and dates of birth. Odido said passwords, call records, billing data, and ID document scans were not impacted. The company notified the Dutch Data Protection Authority within 48 hours and began customer notifications while external responders increased monitoring.

Key lesson: A single customer-facing system with weak access controls can expose millions of records in a weekend. Containment speed determines the size of the damage.
Figure Technology Solutions
February 2026 Fintech Nearly 967,000 user accounts

A social engineering attack manipulated an employee into providing access to internal systems. ShinyHunters claimed responsibility and posted roughly 2.5 GB of stolen customer records online. Exposed data included names, dates of birth, email addresses, postal addresses, and phone numbers, raising significant identity theft and phishing risks for affected individuals. Figure stated it is notifying impacted users and offering credit monitoring.

Key lesson: Technical defences mean nothing if an attacker can talk their way past a human. Social engineering remains one of the most effective and underestimated breach vectors.
PayPal Working Capital
February 2026 Financial Services Undisclosed number of PPWC users

A threat actor accessed PayPal systems starting 1 Jul 2025 and remained undetected until 12 Dec 2025, a six-month dwell time. Breach letters reached impacted users on 10 Feb 2026. Some customers reported unauthorized transactions. PayPal issued refunds and forced password resets. No public aggregate dollar total for stolen funds has been disclosed.

Key lesson: Six months of undetected access inside a major financial platform shows that breach detection gaps are not limited to small vendors. Dwell time is where the real damage happens.
European Commission Cloud Breach
March 2026 Government Undisclosed

A cyberattack struck the cloud infrastructure hosting the Europa web platform on 24 Mar 2026. Early findings confirmed data was taken from affected websites. The Commission said the incident was contained quickly and its internal systems were not impacted. No threat actor has been named and the full scope of data taken remains under investigation.

Key lesson: Public-facing cloud environments are high-value targets even for the most scrutinised institutions. Regular penetration testing and compliance alignment are not optional at this scale.

Which Industries Are Most at Risk?

Third-party breaches affect every sector. But the exposure is not evenly distributed.

Healthcare Pharma, biotech and healthcare software providers 22% of incidents
Financial Third-party payment processors and fintech integrations $6.08M avg cost
Technology Tech vendors remain the most common entry point 46.75% of breaches
Government Supply chain attacks on government contractors 2nd by volume

How to Reduce Your Third-Party Breach Risk

You cannot control what happens inside a vendor’s environment. You can control how much access they have, how closely you monitor them, and how fast you respond when something goes wrong.

1

Map Your Vendor Ecosystem

Build a complete inventory of third parties: who they are, what data they touch, and what systems they can access. Include fourth parties where your most critical vendors use their own subcontractors. You cannot manage risk you cannot see.

2

Tier Vendors by Risk Level

A vendor with read access to anonymised data is different from one with write access to customer payment records. Tier your vendors by the sensitivity of data they handle and the depth of their system access. Apply your heaviest scrutiny to the top tier.

3

Move Beyond Annual Questionnaires

A questionnaire filled out once a year tells you what a vendor’s security posture was when they filled it out. Continuous monitoring shows you what it is right now. Tools that track vendors’ external security signals, open vulnerabilities, and dark web exposure give you real-time risk signals.

4

Set Contractual Security Requirements

Your vendor contracts should specify minimum security standards: encryption requirements, breach notification timelines, penetration testing schedules, and your right to audit. A vendor who won’t agree to a 72-hour breach notification requirement is telling you something important.

5

Apply Least Privilege to Vendor Access

Vendors should only access the systems and data they need to deliver their service. Review vendor access permissions quarterly. Revoke access immediately when a contract ends. Many third-party breaches persist longer than necessary because vendor credentials were never deprovisioned.

6

Build a Third-Party Incident Response Plan

When a vendor calls to say they have been breached, you need to know exactly what to do in the next 24 hours. Which data was accessible? Who do you notify? GDPR requires notification within 72 hours. HIPAA requires notification within 60 days. Having the plan before the breach means you spend that time executing, not deciding.

Cybersecurity Skills for a World of Third-Party Risk

Third-party data breaches are now a core focus of enterprise cybersecurity. The analysts, engineers, and security architects managing vendor risk, supply chain monitoring, and incident response are in demand across every industry.

Metana’s Cybersecurity Bootcamp covers the skills that apply directly to this threat landscape: network security, risk assessment, ethical hacking, and compliance frameworks including GDPR, HIPAA, and SOC 2. If you are a beginner and wondering to start a cybersecurity career, this would be a great start!

🛡 ExploreMetana Cybersecurity Bootcamp — Built to Get You Hired

The Bottom Line

A third-party data breach can expose your customers’ data, trigger regulatory penalties, and cost your organisation millions without a single attacker ever touching your systems. Your security posture is only as strong as the weakest vendor in your supply chain.

The organisations that manage this risk well treat vendor security as a continuous discipline, not a compliance checkbox. Map your vendors. Monitor them. Hold them to contractual standards. Have a response plan ready before the call comes.

Want to build the cybersecurity skills to manage this risk professionally? 🚀

Explore the Metana Cybersecurity Bootcamp.

metana.io: Built to get you hired.

Explore the Bootcamp at metana.io →

FAQ

What is a third-party data breach?
A third-party data breach occurs when a vendor, supplier, or partner that holds or has access to your data is compromised by an attacker. Your organisation is not directly attacked, but your data is exposed through the vendor’s systems.
What is the difference between a first-party and third-party data breach?
A first-party breach is a direct attack on your own systems. A third-party breach happens at a vendor or partner. Third-party breaches are more expensive on average ($4.91M vs $4.44M), take longer to detect, and are harder to contain because the fix depends on the vendor, not you.
How common are third-party data breaches?
At least 36% of all data breaches in 2024 originated from third-party compromises, up 6.5% year-over-year (SecurityScorecard, 2025). The real number is likely higher: many organisations never confirm the third-party connection publicly.
Which industries are most affected by third-party data breaches?
Healthcare, pharma, and biotech had the highest volume in 2024 at 22% of all third-party incidents. Financial services face the second-highest breach costs at $6.08M per incident. Technology vendors remain the most common attack entry point.
How do you prevent a third-party data breach?
Map every vendor with access to your data. Tier them by risk level. Monitor them continuously, not just annually. Set contractual security standards including breach notification timelines. Apply least-privilege access and revoke credentials when contracts end. Build a third-party incident response plan before you need it.

Statistics & Data

Powered by Metana Editorial Team, our content explores technology, education and innovation. As a team, we strive to provide everything from step-by-step guides to thought provoking insights, so that our readers can gain impeccable knowledge on emerging trends and new skills to confidently build their career. While our articles cover a variety of topics, we are highly focused on Web3, Blockchain, Solidity, Full stack, AI and Cybersecurity. These articles are written, reviewed and thoroughly vetted by our team of subject matter experts, instructors and career coaches.

Third party data breach

Metana Guarantees a Job 💼

Plus Risk Free 2-Week Refund Policy ✨

You’re guaranteed a new job in web3—or you’ll get a full tuition refund. We also offer a hassle-free two-week refund policy. If you’re not satisfied with your purchase for any reason, you can request a refund, no questions asked.

Web3 Solidity Bootcamp

The most advanced Solidity curriculum on the internet!

Full Stack Web3 Beginner Bootcamp

Learn foundational principles while gaining hands-on experience with Ethereum, DeFi, and Solidity.

You may also like

Metana Guarantees a Job 💼

Plus Risk Free 2-Week Refund Policy

You’re guaranteed a new job in web3—or you’ll get a full tuition refund. We also offer a hassle-free two-week refund policy. If you're not satisfied with your purchase for any reason, you can request a refund, no questions asked.

Web3 Solidity Bootcamp

The most advanced Solidity curriculum on the internet

Full Stack Web3 Beginner Bootcamp

Learn foundational principles while gaining hands-on experience with Ethereum, DeFi, and Solidity.

Events by Metana

Dive into the exciting world of Web3 with us as we explore cutting-edge technical topics, provide valuable insights into the job market landscape, and offer guidance on securing lucrative positions in Web3.

Join 600+ Builders, Engineers, and Career Switchers

Learn, build, and grow with the global Metana tech community on your discord server. From Full Stack to Web3, Rust, AI, and Cybersecurity all in one place.

Subscribe to Lettercamp

We help you land your dream job! Subscribe to find out how

Lock in 20% off your future tech career

Book a free 1:1 with a Metana expert.

No pressure, no commitment.

If it’s a fit, you keep 20% off your tuition.

Our bootcamps come with a Job guarantee.

Get a detailed look at our Cyber Security Bootcamp

Understand the goal of the bootcamp

Find out more about the course

Explore our methodology & what technologies we teach

You are downloading 2026 updated Cyber Security Bootcamp syllabus!

Download the syllabus to discover our Cyber Security Bootcamp curriculum, including key modules, project-based learning details, skill outcomes, and career support. Get a clear path to becoming a Cybersecurity Analyst

Cyber Security Bootcamp Syllabus Download

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Get a detailed look at our AI Automations Bootcamp

Understand the goal of the bootcamp

Find out more about the course

Explore our methodology & what technologies we teach

You are downloading 2026 updated AI Automations Bootcamp syllabus!

Download the syllabus to discover our AI Automations Bootcamp curriculum, including key modules, project-based learning details, skill outcomes, and career support. Get a clear path to becoming a top developer.

AI Automations Bootcamp Syllabus Download

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Get a detailed look at our Software Engineering Bootcamp

Understand the goal of the bootcamp

Find out more about the course

Explore our methodology & what technologies we teach

You are downloading 2026 updated Software Engineering Bootcamp syllabus!

Download the syllabus to discover our Software Engineering Bootcamp curriculum, including key modules, project-based learning details, skill outcomes, and career support. Get a clear path to becoming a top developer.

Software Engineering Bootcamp Syllabus Download

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

It’s Your Turn to Bloom!
Kickstart your tech journey this Spring Enjoy 20% OFF all programs.

It’s Your Turn to Bloom!

Days
Hours
Minutes
Seconds

New Application Alert!

A user just applied for Metana Web3 Solidity Bootcamp. Start your application here : metana.io/apply

Get a detailed look at our AI Software Engineering Bootcamp

Understand the goal of the bootcamp

Find out more about the course

Explore our methodology & what technologies we teach

You are downloading 2026 updated AI Software Engineering Bootcamp syllabus!

Download the syllabus to discover our AI Software Engineering Bootcamp curriculum, including key modules, project-based learning details, skill outcomes, and career support. Get a clear path to becoming a top developer.

Software Engineering Syllabus Download

"*" indicates required fields

This field is for validation purposes and should be left unchanged.