Stairs purple 5 FINAL

New Research Shows 67% Chance of Supply Chain Compromise Attack

The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.

April 13, 2022

Despite being a relatively new attack type, supply chain compromise (sometimes referred to as vendor email compromise) already represents a significant security threat to organizations of all sizes.

During a supply chain compromise attack, a threat actor gains control of a vendor email account and then uses the compromised account to launch attacks on the vendor’s partners. While the attacks can take a variety of forms, the most common is invoice fraud, where the threat actor poses as the vendor and requests payment for a fraudulent invoice. These attacks can also be run through impersonation of vendor accounts—no initial compromise necessary.

As outlined in our H1 2022 Email Threat Report, the risk of supply chain compromise has steadily grown since Abnormal began tracking this attack type in 2020. And since these attacks are nearly impossible for the average employee to recognize, all organizations must take steps to secure their email from vendor fraud.

Supply Chain Compromise Risk Remains Steady

Supply chain compromise attacks are highly successful because they exploit trusted communications between vendors and customers through personalization and social engineering. Because they utilize compromised accounts, these attacks are extremely dangerous, particularly because the threat actor has access to past and ongoing conversations and can use that knowledge to trick recipients.

Since Abnormal began tracking supply chain compromise, the risk has continuously increased, at least until the last half of 2021 when it remained steady for the first time. That isn’t to say the threat should be discounted, as more than a quarter of all Abnormal customers were the target of at least one supply chain compromise attack each week.

Percentage of Customers Targeted with supply chain compromise Each Week

The data shows that nearly two-thirds of all organizations are likely to receive at least one attack over the course of the half. And with the average attack size remaining at $183,000, it isn’t a threat to be taken lightly.

Large Organizations Still Facing Highest Risk

Similar to what we’ve seen with other advanced email attacks, organizations with more employees are at the greatest risk of receiving an attack.

While likely a result of there being more employees to target, particularly within the finance department, some of this can also be attributed to the fact larger organizations often have more vendors who can become compromised. When it comes to the numbers game, cybercriminals often win.

Probability of receiving supply chain compromise by Org Size

Organizations with 50,000 or more employees receive an attack from their supply chain nearly every single week. In fact, businesses of this size have a 96.7% probability of receiving a supply chain compromise attack every seven days.

Even companies with more than 1,500 employees are likely to experience a supply chain compromise attack nearly two weeks out of every three. It’s only when looking at small businesses that there is a small amount of relief, with threat actors targeting organizations with employee counts below 500 only one week in every three.

Innovative Security Measures Are Essential

There is little doubt supply chain compromise is a financially damaging threat. By taking advantage of the trust organizations place in their vendors, the attacks can both deceive humans and bypass traditional email security tools that rely on threat intelligence.

Stopping these attacks requires implementing a solution that can detect and interpret the thousands of signals available through an API, and then block the emails that come from compromised accounts. It’s only by stopping supply chain compromise attacks from reaching inboxes we can truly prevent our employees from being tricked and ensure our organizations stay protected.

To learn more about supply chain compromise attacks, as well as see additional data on business email compromise and phone fraud, download our latest email threat report.


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More