chat
expand_more

The Rising Threat of Vendor Email Compromise

The prolific attack on SolarWinds and their partner ecosystem will forever change how we view supply chain security and the role email communication plays in it. As the events and details surrounding the attack continue to unfold, we have learned from the company itself...
February 17, 2021

The prolific attack on SolarWinds and their partner ecosystem will forever change how we view supply chain security and the role email communication plays in it. As the events and details surrounding the attack continue to unfold, we have learned from the company itself that for at least nine months an “email account was compromised and used to programmatically access accounts of targeted SolarWinds personnel in business and technical roles”.

This key discovery into how the SolarWinds attack started—from a compromised email account—puts a spotlight on the recent findings in Abnormal Security’s The Rising Threat of Vendor Email Compromise in a Post-SolarWinds Era threat research report. In the report, Abnormal goes in-depth into the world of vendor email compromise (VEC) and outlines the rate of acceleration, as well as the financial threat these attacks pose to businesses without proper controls in place.

Key Report Takeaways

  • Companies have a 50% chance of getting attacked through SolarWinds-style vendor email compromise in Q4 2020, an increase of 24% over Q3 2020.
  • The highest observed cost of a VEC attack stopped by Abnormal Security was $1.6 million.
  • The average potential cost of vendor email compromise attacks is $183,000.
  • Billing account update fraud is the costliest form of VEC attack, at close to $300,000 on average per attack.

Why Vendor Email Compromise Works

Supply chain communications are trusted and typically convey a sense of urgency, making it easy for these types of attacks to blend in with legitimate and valid emails. Since the attacks come from trusted, yet impersonated or compromised vendor accounts, organizations often cannot detect when an attack is underway until it is too late.

Additionally, enterprises that use traditional security solutions find emails from compromised vendors are able to bypass existing controls. This gap in protection is highly problematic for security teams who have invested in protection but are still susceptible to vendor compromises.

Abnormal Security Stops the VEC Problem

Abnormal stops socially engineered VEC attacks that bypass traditional solutions and make their way into unsuspecting employees inboxes in the following ways:

  • API Architecture: Abnormal connects into Microsoft Office 365 and Google Workspace via an API, and in doing so, it gives the platform access to signals and data that are needed to detect suspicious activity such as unusual geolocations, IP addresses, mail rule filter changes, unusual devices, and more.
  • AI-Detection Intelligence: Using identity modeling, behavioral and relationship graphs, and deep content analysis, Abnormal provides unparalleled detection intelligence to stop emails that include suspicious financial requests. This includes billing account updates, suspicious links used to phish credentials from employees, and invoices that contain unusual amounts or never-before-seen bank account information.
  • VendorBase: Abnormal has a global, federated database of vendor and customer behaviors to stop supply chain compromise. VendorBase continuously monitors communications between vendors and customers, and provides a real-time, stateful risk assessment enabling the Abnormal AI-detection engine to stop these targeted and sophisticated supply chain attacks.

VendorBase Provides Proactive Supply Chain Risk Management

For enterprises with thousands of vendors in their supply chain, it’s a monumental challenge to have real-time insights into which ones have known risks to your organization. VendorBase automates this process and removes the manual burden of remediating and investigating VEC attacks from compromised vendors.

VendorBase also tracks the reputations of an organization’s vendors and customers, and improves the detection accuracy for advanced social engineering attacks. Benefits include:

  • No Configuration or Setup Required: Automatically classifies vendors and customers based on your email communication.
  • Continuous Reputation and Risk Scoring: Automatically computed vendor/customer risk score based on domains being impersonated or spoofed, accounts being compromised, and suspicious or illegitimate businesses.
  • Stop Attacks, Enable Remediation: Provides detailed views of all vendors and stops supply chain attacks from impersonated, spoofed, or compromised vendors.

To learn more, download a copy of The Rising Threat of Vendor Email Compromise in a Post-SolarWinds Era.

The Rising Threat of Vendor Email Compromise

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B Most Interesting Attacks Q1 2024
Take a look at five of the most unique and sophisticated email attacks recently detected and stopped by Abnormal.
Read More
B MKT499 Images for Customer Blog Series
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Read More
B Construction Professional Services QR Code Attacks
Abnormal data shows construction firms and professional service providers are up to 19.2 times and 18.5 times, respectively, more likely to receive QR code attacks than organizations in other industries.
Read More
B 1500x1500 Evolving Abnormal R2
From the beginning, we created Abnormal Security to be a generational company that protects people from cybercrime. Here’s how we’re doing it.
Read More
Blog Cover 1500x1500 Images for SOC Time Blog
Discover the critical tasks that occupy SOC analysts’ schedules beyond mere inbox management, and discover insights into optimizing efficiency in cybersecurity operations.
Read More
B 1500x1500 MKT494 Top Women in Cybersecurity
In honor of Women's History Month, we're spotlighting 10 women leaders who are making invaluable contributions to cybersecurity.
Read More