Ericsson breach blamed on third party vendor vishing attack • The Register

By Cybersol·March 12, 2026·5 min read
SourceOriginally from Ericsson breach blamed on third party vendor vishing attack • The Register by The RegisterView original

Vendor Notification Delays as Regulatory Exposure: The Ericsson Breach and Supply Chain Governance Failure

Why This Matters at Board and Regulatory Level

The Ericsson incident—a 15,661-record breach initiated through vishing against an unnamed third-party vendor—exposes a structural governance failure that regulators are increasingly scrutinizing: the seven-month gap between breach discovery (April 2025) and notification to the primary organization (November 2025). This delay is not incidental; it represents a contractual and operational breakdown in vendor risk management that creates compounding liability exposure across multiple parties. For organizations subject to NIS2, DORA, GDPR, or equivalent regimes, vendor notification delays can themselves constitute reportable incidents. The absence of real-time visibility into vendor security events, combined with weak contractual enforcement of incident reporting obligations, has become a material governance weakness that boards and compliance functions must address immediately.

The Vishing Vector Reveals Deliberate Supply Chain Targeting

Attackers did not compromise Ericsson's infrastructure directly. Instead, they targeted a single employee at an unnamed third-party vendor supporting Ericsson's US operations through a voice-phishing (vishing) attack—a low-sophistication social engineering technique that relies on human manipulation rather than technical exploitation. This targeting pattern is deliberate: attackers recognize that supply chain nodes typically operate with lower security maturity, weaker multi-factor authentication, less rigorous access controls, and fewer behavioral security controls than tier-one vendors. The vendor's employee was compromised between April 17–22, 2025, but the breach was not discovered until April 28—an 11-day detection gap that itself suggests inadequate monitoring. Yet most vendor risk assessments focus narrowly on technical controls, compliance certifications, and audit reports rather than behavioral security maturity, social engineering resilience, incident detection capabilities, or response readiness. The vishing success indicates the vendor lacked either adequate employee training, authentication controls (such as hardware security keys or strict call-back verification protocols), or both.

The Seven-Month Notification Delay Violates Regulatory Intent

The timeline is damning: breach occurrence (April 2025) → discovery (April 28, 2025) → notification to Ericsson (November 10, 2025) → notification to affected individuals (February 23, 2026). A seven-month gap between discovery and notification to the primary organization violates the spirit and letter of GDPR Article 33 (notification "without undue delay"), DORA Article 19 (ICT incident reporting timelines), and NIS2 Directive requirements for prompt incident escalation. However, most vendor agreements lack explicit contractual mechanisms to enforce rapid notification. Common deficiencies include: (1) no mandatory incident reporting timelines with specific escalation triggers; (2) no audit rights enabling real-time visibility into vendor security events; (3) no liability or indemnification provisions for notification failures; (4) ambiguous definitions of what constitutes a "reportable incident"; and (5) no integration of vendor threat intelligence into the primary organization's incident response procedures. Many organizations treat vendor incident notification as a courtesy rather than a contractual obligation with teeth. This Ericsson case demonstrates the regulatory and operational cost of that approach.

Cascading Liability and the Absence of Continuous Monitoring

The breach creates liability exposure across multiple parties: affected individuals faced unmitigated identity theft and financial fraud risk during the seven-month window; Ericsson faces potential regulatory enforcement for delayed notification and inadequate vendor oversight; the unnamed vendor faces independent liability for the breach and notification failure; and downstream customers of Ericsson may claim the organization failed to exercise adequate vendor due diligence. The Texas filing reveals the scope: 4,377 individuals in Texas alone, with exposed data potentially including names, addresses, Social Security numbers, driver's license numbers, government-issued IDs, bank account numbers, payment card numbers, medical information, and dates of birth. This is not a minor data exposure; it is a comprehensive identity theft vector. The systemic weakness underlying this incident is the absence of continuous vendor security monitoring and real-time incident visibility. Most vendor risk frameworks operate on an annual or semi-annual audit cycle, creating blind spots between assessments. By the time Ericsson learned of the breach, seven months had elapsed—long enough for attackers to weaponize the stolen data, sell it on dark markets, or conduct identity fraud at scale.

Governance Remediation: What Organizations Must Implement Now

Adequate vendor risk governance requires structural changes to both contracts and operations. First, incident notification clauses must specify mandatory timelines: discovery → vendor internal notification (24 hours), vendor → primary organization (48 hours), primary organization → regulators (72 hours where required). Second, organizations must establish audit rights enabling real-time visibility into vendor security events, threat intelligence, and incident response procedures—not just annual compliance certifications. Third, liability and indemnification clauses must explicitly address notification failures, creating financial consequences for vendors that delay reporting. Fourth, vendor agreements must define "reportable incidents" clearly, including vishing attacks, credential compromise, unauthorized access, and data exfiltration. Fifth, organizations should conduct regular tabletop exercises simulating vendor breaches, testing escalation procedures, communication protocols, and regulatory notification timelines. Finally, vendor risk assessments must expand beyond technical controls to evaluate behavioral security maturity, social engineering resilience, employee training rigor, and incident response readiness. The Ericsson case shows that the weakest link in a supply chain is often not the software—it is the human being answering the phone, combined with the absence of contractual and operational mechanisms to ensure rapid escalation when that link fails.

Attribution and Source

Original Source: Carly Page, The Register, "Ericsson breach blamed on third party vendor vishing attack," March 10, 2026.
URL: https://www.theregister.com/2026/03/10/ericsson_blames_vendor_vishing_slipup/

Closing Reflection

This incident is not unique; it is representative of a widespread governance gap in how organizations manage third-party security incidents. The combination of low-sophistication attack vectors (vishing), delayed detection, extended notification delays, and absent contractual enforcement mechanisms creates a pattern that regulators are now actively investigating. Organizations should review the original Register article for full detail, then conduct an immediate audit of their vendor incident notification clauses, monitoring procedures, and escalation protocols. The cost of remediation now is far lower than the cost of regulatory enforcement, breach notification, and liability exposure later.