SolarStorm Timeline: Details of the Software Supply-Chain Attack
Although this is not the 1st application source-chain compromise, it may well be the most noteworthy, as the attacker was making an attempt to obtain popular, persistent access to a range of vital networks.