chat
expand_more

From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise

For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise

For years, executives were the go-to impersonated party in business email compromise (BEC) attacks. Recently, however, attackers have adjusted their strategies—opting to impersonate third-party vendors and suppliers instead.

In January 2022, the number of attacks impersonating third parties surpassed those impersonating internal employees for the first time. This trend has continued each month since, with third-party impersonations making up 52% of all BEC attacks in May 2022.

Download the threat intelligence report for valuable insight into financial supply chain compromise, including:

  • What the four types of supply chain compromise look like

  • How threat actors impersonate vendors in two specific ways

  • Why BEC attacks impersonating executives have decreased 17% year-over-year

Download Now

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email and collaboration application attacks with Abnormal.
See a Demo

Related Resources

B 05 08 23 MKT006 Rise of Israel Based BEC Attacks R2
A recent study uncovered the emergence of an Israel-based threat group that launches sophisticated, multistage BEC attacks targeting global enterprises.
Download Now
B 07 20 22 Devastating
Business email compromise (BEC) is no joke, and it continues to increase—despite increased awareness of the issue. Learn about the future of BEC attacks in this on-demand webinar.
Watch Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Webinar hacking tobac cover
Rachel Tobac talked to Abnormal Security's CISO Mike Britton about hacking, social engineering attacks, and how to protect your organization.
Watch Now
B 04 20 23 CISO guide to BEC
See why business email compromise is the most significant cybersecurity threat to organizations and how to protect your employees from these attacks.
Download Now