chat
expand_more

From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise

Learn why threat actors are opting to impersonate suppliers and vendors instead of executives in business email compromise (BEC) attacks.
From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise

For years, executives were the go-to impersonated party in business email compromise (BEC) attacks. Recently, however, attackers have adjusted their strategies—opting to impersonate third-party vendors and suppliers instead.

In January 2022, the number of attacks impersonating third parties surpassed those impersonating internal employees for the first time. This trend has continued each month since, with third-party impersonations making up 52% of all BEC attacks in May 2022.

Trend of Internal vs External BEC Impersonation Attacks

Download From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise to learn:

  • What the four types of supply chain compromise look like

  • How threat actors impersonate vendors in two specific ways

  • Why BEC attacks impersonating executives have decreased by 17% year-over-year

Fill out the form to get your copy today.

Need an image here

After viewing this resource, you are eligible for 1 CPE credit through ISC2.

Download Now

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email and collaboration application attacks with Abnormal.
See a Demo

Related Resources